diff --git a/2.1-dev/risk/index-en.html b/2.1-dev/risk/index-en.html index d082f005d..35ffb9e3b 100644 --- a/2.1-dev/risk/index-en.html +++ b/2.1-dev/risk/index-en.html @@ -13,7 +13,7 @@ title: "Risk Concepts (RISK)", subtitle: "version 2.1-dev", publishDate: "2024-08-18", - specStatus: "CG-FINAL", + specStatus: "CG-DRAFT", group: "dpvcg", latestVersion: "https://w3id.org/dpv/risk", canonicalUri: "https://w3id.org/dpv/risk", @@ -643,33 +643,42 @@

Core Concepts

- -
-

Likelihood, Severity, and Levels

-

To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

- +
+

Risk Management

+

lorem ipsum

+
+ +
+

Risk Assessment

+

lorem ipsum

+
+ +
+

Likelihood, Severity, and Levels

+

To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

+ -
    +
    • risk:3LikelihoodLevels: Scale with 3 Likelihood Levels from High to Low go to full definition @@ -951,6 +960,7 @@

      Likelihood, Severity, and Levels

    +
@@ -1340,6 +1350,63 @@

Taxonomies

Potential Risk Sources

    +
  • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
  • +
  • + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
  • +
  • + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
      +
    • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
        +
      • + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition + +
      • +
      • + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition + +
      • +
      • + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
          +
        • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition + +
        • +
        • + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition + +
        • +
        +
      • +
      +
    • +
    +
  • +
  • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition + +
  • +
  • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
    • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -1455,12 +1522,12 @@

      Potential Risk Sources

      go to full definition
      • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser go to full definition
      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised go to full definition
      • @@ -1469,237 +1536,232 @@

        Potential Risk Sources

        go to full definition
        • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
        • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
        • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
        • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
        • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
        • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
        • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
        • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
        • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
        • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
        • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
        • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
        • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
          • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
        • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
      • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + risk:UnauthorisedActivity: Concept representing Unauthorised Activity go to full definition
        • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises go to full definition
        • - risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access go to full definition
        • - risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure go to full definition
        • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification go to full definition
        • - risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access go to full definition
        • - risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure go to full definition
        • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification go to full definition
        • - risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure go to full definition
        • - risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification go to full definition
        • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use go to full definition
        • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access go to full definition
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion go to full definition
        • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion go to full definition
        • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data go to full definition
      -
    • -
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition -
    • risk:OperationalSecurityRisk: Risks and issues that arise during operational processes go to full definition
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + risk:AuthorisationFailure: Concept representing Authorisation Failure go to full definition
      • - risk:ComponentFailure: Something that acts as or causes Component Failure + risk:ComponentFailure: Concept representing Component Failure go to full definition
      • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + risk:ComponentMalfunction: Concept representing Component Malfunction go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
      • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
      • - risk:Reidentification: Something that acts as or causes Re-identification + risk:Reidentification: Concept representing Re-identification go to full definition
      • - risk:SecurityBreach: Something that acts as or causes Security Breach + risk:SecurityBreach: Concept representing Security Breach go to full definition
        • - risk:DataBreach: Something that acts as or causes Data Breach + risk:DataBreach: Concept representing Data Breach go to full definition
          • @@ -1708,7 +1770,7 @@

            Potential Risk Sources

          • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + risk:ConfidentialityBreach: Concept representing Confidentiality Breach go to full definition
          • @@ -1722,47 +1784,17 @@

            Potential Risk Sources

        • - risk:SystemFailure: Something that acts as or causes System Failure + risk:SystemFailure: Concept representing System Failure go to full definition
        • - risk:SystemMalfunction: Something that acts as or causes System Malfunction + risk:SystemMalfunction: Concept representing System Malfunction go to full definition
      • -
      • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition -
@@ -1772,285 +1804,153 @@

Potential Risk Sources

Potential Risks

  • - risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - go to full definition -
      -
    • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
        -
      • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition - -
      • -
      • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
      • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
      • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
      • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
      • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
      • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
      • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition - -
      • -
      -
    • -
    • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition
      • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition - -
      • -
      • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition - -
      • -
      • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition - -
      • -
      • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:LegalComplianceRisk: Risks and consequences regarding legal compliance and its violation + go to full definition
        • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition - -
        • -
        • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition - -
        • -
        • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition -
            -
          • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
          • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:IllegalDataProcessing: Concept representing Illegal Processing of Data + go to full definition
          • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:PublicOrderBreach: Concept representing Public Order Breach + go to full definition
          • -
          -
        • -
        -
      • -
      -
    • -
    -
  • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
  • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
  • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
  • -
  • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - +
  • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:LegallyRelevantConsequence: A consequence that is legally relevant i.e. actionable under law + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition - -
    • -
    • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition -
        -
      • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition - -
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:MaterialDamage: Concept representing Material Damage + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:NonMaterialDamage: Concept representing Non-Material Damage + go to full definition
    • -
    -
  • - risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals - go to full definition -
      -
    • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
    • -
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition - -
    • -
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
    • @@ -2058,229 +1958,369 @@

      Potential Risks

      go to full definition
      • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
      • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
      • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
      • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
      • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
      • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
    • - risk:OperationalSecurityRisk: Risks and issues that arise during operational processes - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
            +
          • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
          • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
          • +
          +
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
              +
            • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
            • +
            +
          • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
          • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
          • +
          +
        • +
        +
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
        • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
        • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
          • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
        • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
      • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition
        • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate go to full definition
          • @@ -2399,58 +2439,16 @@

            Potential Risks

        • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition - -
        • -
        • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
        • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition
          • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition - -
          • -
          • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition - -
          • -
          • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition - -
          • -
          • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition - -
          • -
          • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition - -
          • -
          • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition - -
          • -
          • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition - -
          • -
          -
        • -
        • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + risk:SocialDisadvantage: Concept representing Social Disadvantage go to full definition
        • @@ -2460,161 +2458,131 @@

          Potential Risks

        • - risk:Terrorism: Something that acts as or causes Terrorism + risk:Terrorism: Concept representing Terrorism go to full definition
      • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition
      • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition -
      • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
      • -
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition - +
    • -
    • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition - +
  • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition - -
  • -
    -
    - -
    -

    Potential Consequences

    -
      + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -2726,98 +2694,79 @@

        Potential Consequences

    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition - -
    • -
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition - -
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
      • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:AuthorisationFailure: Concept representing Authorisation Failure + go to full definition
      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
      • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
      • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - -
      • -
      • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
      • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
      • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition
        • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:DataBreach: Concept representing Data Breach + go to full definition -
        • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition - +
        • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
        • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
        @@ -2825,257 +2774,271 @@

        Potential Consequences

    • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
    +
    + +
    +

    Potential Consequences

    +
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
        -
      • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:Detriment: Something that acts as or causes Detriment - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
      • - risk:IllegalDataProcessing: Something that acts as or causes Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
      • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:DataCorruption: Concept representing Corruption of Data + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
      • - risk:PublicOrderBreach: Something that acts as or causes Public Order Breach - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
      • -
      -
    • - risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others - go to full definition -
        + risk:EquipmentFailure: Concept representing Equipment Failure + go to full definition + +
      • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:EquipmentMalfunction: Concept representing Equipment Malfunction + go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud - go to full definition + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:ViolatingCodeOfConduct: Concept representing Violation of Code of Conduct + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:ViolatingEthicsCode: Concept representing Violation of Ethics Code + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition - -
        • + risk:ViolatingObligation: Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + go to full definition +
          • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
          • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
          • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
          • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
            -
          • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition - @@ -3083,379 +3046,487 @@

            Potential Consequences

        • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition -
            -
          • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition
            • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:Blackmail: Concept representing Blackmail + go to full definition
            • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:Coercion: Concept representing Coercion + go to full definition
            • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:Extorsion: Concept representing Extorsion + go to full definition
            • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:Fraud: Concept representing Fraud + go to full definition
            • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:IdentityFraud: Concept representing Identity Fraud + go to full definition
            • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:IdentityTheft: Concept representing Identity Theft + go to full definition
            • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:InterceptCommunications: Concept representing Interception of Communications + go to full definition
            • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:PhishingScam: Concept representing Phishing Scam + go to full definition
            • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:Sabotage: Concept representing Sabotage + go to full definition
            • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition -
            • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
                +
              • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition
              • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition
              • +
              +
            • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
              • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
                  +
                • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
                • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
                    +
                  • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
                      +
                    • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
                    • +
                    +
                  • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
                  • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
                • +
                +
              • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition
                • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:LoseCredibility: Concept representing Loss of Credibility + go to full definition
                • -
                +
              • + risk:LoseCustomerConfidence: Concept representing Loss of Customer Confidence + go to full definition +
              • -
              +
            • + risk:LoseGoodwill: Concept representing Loss of Goodwill + go to full definition +
            • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:LoseNegotiatingCapacity: Concept representing Loss of Negotiating Capacity + go to full definition
            • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:LoseOpportunity: Concept representing Loss of Opportunity + go to full definition
            • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition - +
            • +
            • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition +
              • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:CustomerSupportLimited: Concept representing customer support to be limited + go to full definition
              • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DelayedApplicationProcessing: Concept representing delayed processing of applications + go to full definition
              • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:IdentityVerificationFailure: Concept representing failure to verify identity + go to full definition
              • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:InabilityToEnterIntoContract: Stub + go to full definition
              • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:InabilityToEstablishLegalClaims: Stub + go to full definition
              • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition + risk:InabilityToFulfillLegalObligations: Stub + go to full definition
              • -
              +
            • + risk:InabilityToProcessPayments: Stub + go to full definition +
            • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:InabilityToProtectVitalInterests: Stub + go to full definition
            • - risk:SocietalHealthSafety: None - go to full definition + risk:InabilityToProvideHealthCare: Stub + go to full definition
            • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:LegalSupportLimited: Stub + go to full definition
            • -
            +
          • + risk:LoyaltyProgramExclusion: Stub + go to full definition +
          • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:PersonalisationDisabled: Stub + go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction - go to full definition + risk:PersonalisationEnabled: Stub + go to full definition
          • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition - +
          • +
          +
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition + +
        • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
            +
          • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
              +
            • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
            • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
            • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
            • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
            • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
            • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition
            • -
    -
    - -
    -

    Potential Impacts

    -
    • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
    • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition -
        + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition
        • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition
        • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
      • +
      +
    • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
    • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Concept representing Terrorism + go to full definition +
    @@ -3464,7 +3535,12 @@

    Potential Impacts

    go to full definition
    • - risk:Harm: Something that acts as or causes Harm to humans + risk:ExposureToHarmfulSpeech: Concept representing Harmful Speech + go to full definition + +
    • +
    • + risk:Harm: Concept representing Harm to humans go to full definition
      • @@ -3473,12 +3549,12 @@

        Potential Impacts

      • - risk:Injury: Something that acts as or causes Injury + risk:Injury: Concept representing Injury go to full definition
      • - risk:PhysicalAssault: Something that acts as or causes Physical Assault + risk:PhysicalAssault: Concept representing Physical Assault go to full definition
      • @@ -3488,7 +3564,7 @@

        Potential Impacts

      • - risk:PsychologicalHarm: Something that acts as or causes Psychological Harm + risk:PsychologicalHarm: Concept representing Psychological Harm go to full definition
      • @@ -3498,12 +3574,12 @@

        Potential Impacts

      • - risk:SexualViolence: Something that acts as or causes Sexual Violence + risk:SexualViolence: Concept representing Sexual Violence go to full definition
      • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence + risk:ViolenceAgainstChildren: Concept representing Child Violence go to full definition
      • @@ -3513,6 +3589,11 @@

        Potential Impacts

        risk:IndividualHealthSafety: None go to full definition + +
      • + risk:PersonalSafetyEndangerment: Concept representing Personal Safety Endangerment + go to full definition +
      • risk:Privacy: None @@ -3522,266 +3603,1860 @@

        Potential Impacts

    • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition -
          -
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
        • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
        • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
        • +
        +
      • +
      +
    • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
    • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
    • -
    -
  • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition
    • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition
      • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
        • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
        • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
        • +
        +
      • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
        • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
          • - risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
          • - risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
          • -
          +
        • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
            +
          • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition +
          • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
          • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
          • +
          +
        • +
        +
      • +
      +
    • +
    +
  • + +
  • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition
    • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition
    • - risk:Misandry: Dislike, contempt, or prejudice against men - go to full definition + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition
    • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition
    • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition
    • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition
    • -
    +
  • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition +
  • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition -
      + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
    • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition
    • -
    +
  • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition +
  • - +
  • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition +
  • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition
  • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition
  • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition -
      + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
    • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition
    • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition
    • +
    +
  • +
    +
    + +
    +

    Potential Impacts

    +
    • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
    • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
    • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
    • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
        • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
          • -
    -
    - -
    -

    Overview of Concepts and Roles

    - - - - - - - - - - - - - - +
  • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
  • +
  • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
  • + + + + +
  • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • +
  • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition + +
  • + + +
  • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
  • +
  • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition + +
  • + + + +
    +

    Technical Risk Concepts

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
        +
      • + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition + +
      • +
      • + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition + +
      • +
      • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
      • +
      • + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it + go to full definition +
          +
        • + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition + +
        • +
        • + risk:Cryptojacking: Concept representing Cryptojacking + go to full definition + +
        • +
        • + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) + go to full definition +
            +
          • + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) + go to full definition + +
          • +
          +
        • +
        • + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack + go to full definition + +
        • +
        • + risk:MalwareAttack: Concept representing Malware Attack + go to full definition + +
        • +
        • + risk:SystemIntrusion: Concept representing System Intrusion + go to full definition + +
        • +
        +
      • +
      • + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
          +
        • + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition + +
        • +
        • + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition + +
        • +
        • + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition + +
        • +
        • + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition + +
        • +
        • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
        • +
        • + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition + +
        • +
        • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition + +
        • +
        • + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition + +
        • +
        • + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition + +
        • +
        • + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
        • +
        • + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition + +
        • +
        • + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition + +
    • +
    +
    + +
    +

    Organisational Risk Concepts

    +
    +
    + +
    +

    Societal Risk Concepts

    +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
    + + + +
    +

    Overview of Concepts and Roles

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality
    + + + + + + + + + + + + + @@ -4007,6 +5682,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4067,6 +5752,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4082,7 +5777,7 @@

    Overview of Concepts and Roles

    - + @@ -4117,6 +5812,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4127,6 +5832,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4158,7 +5873,7 @@

    Overview of Concepts and Roles

    - + @@ -4237,6 +5952,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4277,6 +6002,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4337,6 +6072,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4357,6 +6102,66 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4478,13 +6283,43 @@

    Overview of Concepts and Roles

    - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4557,6 +6392,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4677,6 +6522,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4697,6 +6552,26 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + @@ -4737,6 +6612,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4767,6 +6652,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4858,7 +6753,7 @@

    Overview of Concepts and Roles

    - + @@ -4868,7 +6763,7 @@

    Overview of Concepts and Roles

    - + @@ -4878,7 +6773,7 @@

    Overview of Concepts and Roles

    - + @@ -4888,7 +6783,7 @@

    Overview of Concepts and Roles

    - + @@ -4898,7 +6793,7 @@

    Overview of Concepts and Roles

    - + @@ -4908,7 +6803,7 @@

    Overview of Concepts and Roles

    - + @@ -4928,7 +6823,7 @@

    Overview of Concepts and Roles

    - + @@ -5007,6 +6902,126 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -5098,8 +7113,8 @@

    Overview of Concepts and Roles

    - - + + @@ -5157,6 +7172,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5387,6 +7412,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5397,6 +7432,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5422,192 +7467,2009 @@

    Overview of Concepts and Roles

    - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    +
    + +
    +

    Rights Impacts

    +

    lorem ipsum

    +
    + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality Integrity Availability
    risk:CustomerSupportLimited
    risk:Damage
    risk:DelayedApplicationProcessing
    risk:DenialServiceAttack
    risk:DisproportionateEnergyConsumption
    risk:DistributedDenialServiceAttack
    risk:Earthquake
    risk:EnvironmentalRisk
    risk:ErroneousSystemUserisk:ErroneousUse
    risk:Floods
    risk:Fraud
    risk:GroupRisk
    risk:Harassment
    risk:IdentityVerificationFailure
    risk:IllegalDataProcessing
    risk:InabilityToEnterIntoContract
    risk:InabilityToEstablishLegalClaims
    risk:InabilityToFulfillLegalObligations
    risk:InabilityToProcessPayments
    risk:InabilityToProtectVitalInterests
    risk:InabilityToProvideHealthCare
    risk:IndirectDiscrimination
    risk:LegalRiskrisk:LegalComplianceRisk
    risk:LegallyRelevantConsequence
    risk:LegalRiskConcept
    risk:LegalSupportLimited
    risk:LoyaltyProgramExclusion
    risk:MaliciousActivity
    risk:OrganisationalRiskConcept
    risk:OutGroupHomogeneityBias
    risk:PersonalisationDisabled
    risk:PersonalisationEnabled
    risk:PersonalSafetyEndangerment
    risk:PolicyRisk
    risk:Privacy
    risk:PublicServicesExclusion
    risk:RacialDiscrimination
    risk:RightErodedrisk:RightsDenied
    risk:RightObstructedrisk:RightsEroded
    risk:RightsDenialrisk:RightsExercisePrevented
    risk:RightsExercisePreventionrisk:RightsImpact
    risk:RightsImpactrisk:RightsLimited
    risk:RightsLimitationrisk:RightsObstructed
    risk:RightsViolationrisk:RightsViolated
    risk:ServiceAlternativeOffered
    risk:ServiceCostIncreased
    risk:ServiceDenied
    risk:ServiceLimited
    risk:ServiceNotProvided
    risk:ServicePartiallyProvided
    risk:ServiceProvided
    risk:ServiceProvisionDelayed
    risk:ServiceQualityReduced
    risk:ServiceRelatedConsequence
    risk:ServiceSecurityReduced
    risk:ServiceTermination
    risk:SexDiscrimination
    risk:SocietalRiskrisk:SocietalRiskConcept
    risk:TechnicalRiskConcept
    risk:Terrorism
    risk:ViolatingObligation
    risk:ViolatingPolicy
    risk:ViolatingProhibition
    risk:ViolatingStatutoryObligations
    + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing accidental misuse (of something)
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 3x3

    -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    - - - - - + + + + + + + + + + - - - - + + + +
    LowModerateHigh
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + - - - - + + + + - - - - + + -
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]TermBenefitPrefixrisk
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]LabelBenefit
    -
    + + IRI + https://w3id.org/dpv/risk#Benefit + + + + + + Type + rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk + + + + Broader/Parent types + risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept + + + -
    -

    Risk Matrix 5x5

    - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + +
    Very LowLowModerateHighVery High
    DefinitionConcept representing benefits - both material and immaterial
    Usage NoteEven though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermBiasPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelBias
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]See More: section RISK-TAXONOMY in AI +
    + +
    - -
    -

    Risk Matrix 7x7

    - + + + + + + + +
    +

    Blackmail

    +
    + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely HighTermBlackmailPrefixrisk
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]TermBruteForceAuthorisationsPrefixrisk
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + - - - - - - - - + + + + - - - - - - - - + + -
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]TermCasteDiscriminationPrefixrisk
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]LabelCaste Discrimination
    -
    + + IRI + https://w3id.org/dpv/risk#CasteDiscrimination + + + + + + Type + rdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept + + + + Broader/Parent types + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept + + + + + + + + + + + + Definition + Discrimination based on a person's caste, a form of social stratification found in some cultures + + + -
    + + + + + + + Date Created + 2024-09-30 + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    @@ -5615,11 +9477,169 @@

    Classes

    +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    @@ -5627,21 +9647,251 @@

    Classes

    +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5649,7 +9899,76 @@

    Classes

    +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5657,7 +9976,76 @@

    Classes

    +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5667,7 +10055,85 @@

    Classes

    +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5675,7 +10141,85 @@

    Classes

    +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5683,44 +10227,43 @@

    Classes

    - -
    -

    3 Likelihood Levels

    +
    +

    Confidentiality Breach

    - + - + - + - + - - - - - + @@ -5729,22 +10272,28 @@

    3 Likelihood Levels

    - + - + + + + - + - + + + + @@ -5753,7 +10302,7 @@

    3 Likelihood Levels

    - @@ -5761,44 +10310,39 @@

    3 Likelihood Levels

    - -
    -

    3 Risk Levels

    +
    +

    Confidentiality Concept

    Term3LikelihoodLevelsConfidentialityBreach Prefix risk
    Label3 Likelihood LevelsConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to LowConcept representing Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -5807,9 +10351,12 @@

    3 Risk Levels

    - + - + + + + @@ -5820,7 +10367,7 @@

    3 Risk Levels

    - + @@ -5831,7 +10378,7 @@

    3 Risk Levels

    - @@ -5839,42 +10386,42 @@

    3 Risk Levels

    - -
    -

    3 Severity Levels

    +
    +

    Confidentiality Incident

    Term3RiskLevelsConfidentialityConcept Prefix risk
    Label3 Risk LevelsConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - @@ -5885,7 +10432,7 @@

    3 Severity Levels

    - + @@ -5898,18 +10445,15 @@

    3 Severity Levels

    - + - - - - + - @@ -5918,43 +10462,45 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Confirmation Bias

    Term3SeverityLevelsConfidentialityIncident Prefix risk
    Label3 Severity LevelsConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionScale with 3 Severity Levels from High to LowIncident where the confidentiality of information or system has been affected
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -5963,31 +10509,34 @@

    5 Likelihood Levels

    - + - + + + + - + - + - @@ -5996,43 +10545,46 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + +
    +

    Confounding Variables Bias

    Term5LikelihoodLevelsConfirmationBias Prefix risk
    Label5 Likelihood LevelsConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6041,31 +10593,34 @@

    5 Risk Levels

    - + - + + + + - + - + - @@ -6074,41 +10629,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    +
    +

    Consequence Control

    Term5RiskLevelsConfoundingVariablesBias Prefix risk
    Label5 Risk LevelsConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very LowBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -6119,7 +10678,7 @@

    5 Severity Levels

    - + @@ -6132,7 +10691,7 @@

    5 Severity Levels

    - + @@ -6143,7 +10702,7 @@

    5 Severity Levels

    - @@ -6152,41 +10711,45 @@

    5 Severity Levels

    -
    -

    7 Likelihood Levels

    +
    +

    Containment Control

    Term5SeverityLevelsConsequenceControl Prefix risk
    Label5 Severity LevelsConsequence Control
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 5 Severity Levels from Very High to Very LowRisk Mitigation Measure that controls the Consequences
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -6197,7 +10760,7 @@

    7 Likelihood Levels

    - + @@ -6210,18 +10773,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -6230,43 +10790,49 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + +
    +

    Copyright Violation

    Term7LikelihoodLevelsContainmentControl Prefix risk
    Label7 Likelihood LevelsContainment Control
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowControl to contain event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - + @@ -6275,22 +10841,28 @@

    7 Risk Levels

    - + - + + + + - + - + + + + @@ -6299,52 +10871,58 @@

    7 Risk Levels

    -
    Term7RiskLevelsCopyrightViolation Prefix risk
    Label7 Risk LevelsCopyright Violation
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowConcept representing Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    + + -
    -

    7 Severity Levels

    + + + +
    +

    Coverage Bias

    - + - + - + - + - - - - - + @@ -6353,31 +10931,34 @@

    7 Severity Levels

    - + - + + + + - + - + - @@ -6385,23 +10966,23 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    +
    +

    Cross-Border Incident

    Term7SeverityLevelsCoverageBias Prefix risk
    Label7 Severity LevelsCoverage Bias
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -6431,7 +11012,7 @@

    Accidental Incident

    - + @@ -6464,36 +11045,37 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    +
    +

    Cryptojacking

    TermAccidentalIncidentCrossBorderIncident Prefix risk
    LabelAccidental IncidentCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#CrossBorderIncident
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsIncident involving cross-border or multiple jurisdictions
    - + - + - + - + - @@ -6507,20 +11089,32 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + @@ -6537,40 +11131,36 @@

    Accidental Misuse

    -
    -

    Age Discrimination

    +
    +

    Customer Support Limited

    TermAccidentalMisuseCryptojacking Prefix risk
    LabelAccidental MisuseCryptojacking
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse - → risk:UserRisks + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionAccidental MisuseConcept representing Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - @@ -6584,7 +11174,7 @@

    Age Discrimination

    - + @@ -6597,7 +11187,7 @@

    Age Discrimination

    - + @@ -6617,36 +11207,36 @@

    Age Discrimination

    - -
    -

    Authorisation Failure

    +
    +

    Damage

    TermAgeDiscriminationCustomerSupportLimited Prefix risk
    LabelAge DiscriminationCustomer Support Limited
    IRIhttps://w3id.org/dpv/risk#AgeDiscriminationhttps://w3id.org/dpv/risk#CustomerSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's age, often impacting older or younger individualsConcept representing customer support to be limited
    Date Created2024-09-302024-10-21
    - + - + - + - + - @@ -6660,23 +11250,20 @@

    Authorisation Failure

    - + - - - - + - + @@ -6702,38 +11289,37 @@

    Authorisation Failure

    - -
    -

    None

    +
    +

    Data Aggregation Bias

    TermAuthorisationFailureDamage Prefix risk
    LabelAuthorisation FailureDamage
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureConcept representing Damage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -6745,19 +11331,31 @@

    None

    - + + + + - + + + + - + + + + - + + + + @@ -6770,35 +11368,41 @@

    None

    -
    -

    Availability Concept

    + + + + +
    +

    Data Bias

    TermAvailabilityBreachDataAggregationBias Prefix risk
    LabelNoneData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -6811,34 +11415,34 @@

    Availability Concept

    - + - - - - + - + + + + - + - + - @@ -6846,44 +11450,49 @@

    Availability Concept

    -
    -

    Availability Incident

    + + + + + + + +
    +

    Data Breach

    TermAvailabilityConceptDataBias Prefix risk
    LabelAvailability ConceptData Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcepthttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec modelBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Source
    Date Created2024-09-292024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6892,28 +11501,40 @@

    Availability Incident

    - + + + + - + + + + - + - - + + + + + + + + - @@ -6922,48 +11543,45 @@

    Availability Incident

    -
    -

    Avoid Source

    + + + + +
    +

    Data Corruption

    TermAvailabilityIncidentDataBreach Prefix risk
    LabelAvailability IncidentData Breach
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedConcept representing Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in DEX
    - + - + - + - + - - - - - + @@ -6972,22 +11590,31 @@

    Avoid Source

    - + - + + + + - + + + + - + - + + + + @@ -6996,7 +11623,7 @@

    Avoid Source

    - @@ -7008,37 +11635,37 @@

    Avoid Source

    -
    -

    Benefit

    +
    +

    Data Processing Bias

    TermAvoidSourceDataCorruption Prefix risk
    LabelAvoid SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcept representing Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7052,28 +11679,28 @@

    Benefit

    - + - + + + + - + - - - - + - + @@ -7091,35 +11718,37 @@

    Benefit

    -
    -

    Bias

    +
    +

    Delayed Application Processing

    TermBenefitDataProcessingBias Prefix risk
    LabelBenefitData Processing Bias
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Renumeration - → risk:FinancialImpact + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7132,34 +11761,28 @@

    Bias

    - + - - - - + - + - - - - + - @@ -7167,46 +11790,44 @@

    Bias

    - - - - - -
    -

    Blackmail

    +
    +

    Deliberate Incident

    TermBiasDelayedApplicationProcessing Prefix risk
    LabelBiasDelayed Application Processing
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#DelayedApplicationProcessing
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersConcept representing delayed processing of applications
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -7215,37 +11836,28 @@

    Blackmail

    - + - - - - + - + - - - - - - - - + + - @@ -7257,37 +11869,37 @@

    Blackmail

    - -
    -

    Brute Force Authorisations

    +
    +

    Denial of Service Attack (DoS)

    TermBlackmailDeliberateIncident Prefix risk
    LabelBlackmailDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes BlackmailIncident caused due to deliberate actions of a human
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + @@ -7301,7 +11913,7 @@

    Brute Force Authorisations

    - + @@ -7310,7 +11922,7 @@

    Brute Force Authorisations

    - + @@ -7340,48 +11952,47 @@

    Brute Force Authorisations

    - - - -
    -

    Caste Discrimination

    +
    +

    Detection Control

    TermBruteForceAuthorisationsDenialServiceAttack Prefix risk
    LabelBrute Force AuthorisationsDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesConcept representing Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - - - - + + + + @@ -7390,7 +12001,7 @@

    Caste Discrimination

    - + @@ -7403,7 +12014,7 @@

    Caste Discrimination

    - + @@ -7411,7 +12022,7 @@

    Caste Discrimination

    - @@ -7423,49 +12034,41 @@

    Caste Discrimination

    - -
    -

    Change Consequence

    +
    +

    Detriment

    TermCasteDiscriminationDetectionControl Prefix risk
    LabelCaste DiscriminationDetection Control
    IRIhttps://w3id.org/dpv/risk#CasteDiscriminationhttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some culturesControl to detect event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -7474,7 +12077,7 @@

    Change Consequence

    - + @@ -7487,18 +12090,21 @@

    Change Consequence

    - + - + + + + - + - @@ -7507,48 +12113,44 @@

    Change Consequence

    -
    -

    Change Impact

    + + + +
    +

    Direct Discrimination

    TermChangeConsequenceDetriment Prefix risk
    LabelChange ConsequenceDetriment
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ConsequenceConcept representing Detriment
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7557,7 +12159,7 @@

    Change Impact

    - + @@ -7570,18 +12172,15 @@

    Change Impact

    - + - - - - + - @@ -7593,37 +12192,36 @@

    Change Impact

    - -
    -

    Coercion

    +
    +

    Disability Discrimination

    TermChangeImpactDirectDiscrimination Prefix risk
    LabelChange ImpactDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ImpactOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2024-05-192024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7637,32 +12235,23 @@

    Coercion

    - + - - - - + - + - - - - - - - - + + @@ -7679,36 +12268,36 @@

    Coercion

    -
    -

    Cognitive Bias

    +
    +

    Discrimination

    TermCoercionDisabilityDiscrimination Prefix risk
    LabelCoercionDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes CoercionDiscrimination against individuals based on physical or mental disabilities
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7721,34 +12310,31 @@

    Cognitive Bias

    - + - - - - + - + - + - @@ -7760,23 +12346,23 @@

    Cognitive Bias

    -
    -

    Compensation

    +
    +

    Disproportionate Energy Consumption

    TermCognitiveBiasDiscrimination Prefix risk
    LabelCognitive BiasDiscrimination
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationDiscrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditGeorg P. Krog
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + @@ -7788,9 +12374,7 @@

    Compensation

    - @@ -7803,7 +12387,7 @@

    Compensation

    - + @@ -7816,16 +12400,10 @@

    Compensation

    - + - - - - - - - - + + @@ -7842,36 +12420,38 @@

    Compensation

    - -
    -

    Component Failure

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermCompensationDisproportionateEnergyConsumption Prefix risk
    LabelCompensationDisproportionate Energy Consumption
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#DisproportionateEnergyConsumption
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsThe occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised
    Date Created2024-04-142024-10-21
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7885,23 +12465,32 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + @@ -7918,37 +12507,35 @@

    Component Failure

    - -
    -

    Component Malfunction

    +
    +

    Earthquake

    TermComponentFailureDistributedDenialServiceAttack Prefix risk
    LabelComponent FailureDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureConcept representing Distributed Denial of Service Attack (DDoS)
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7961,12 +12548,9 @@

    Component Malfunction

    - + - - - - + @@ -7975,7 +12559,10 @@

    Component Malfunction

    - + + + + @@ -7990,47 +12577,44 @@

    Component Malfunction

    - - - - - - - -
    -

    Compromise Account

    +
    +

    Environmental Incident

    TermComponentMalfunctionEarthquake Prefix risk
    LabelComponent MalfunctionEarthquake
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#Earthquake
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionThe occurence or potential occurence of earthquakes
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-10-21
    - + - + - + - + - - + + + + @@ -8039,37 +12623,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -8081,36 +12656,35 @@

    Compromise Account

    - -
    -

    Compromise Account Credentials

    +
    +

    Environmental Risk

    TermCompromiseAccountEnvironmentalIncident Prefix risk
    LabelCompromise AccountEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8124,32 +12698,23 @@

    Compromise Account Credentials

    - + - - - - + - + - - - - - - - - + + @@ -8167,37 +12732,36 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Equipment Failure

    TermCompromiseAccountCredentialsEnvironmentalRisk Prefix risk
    LabelCompromise Account CredentialsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedRisks and issues that have their origin in environment or can affect the environment at large
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -8211,9 +12775,12 @@

    Confidentiality Breach

    - + - + + + + @@ -8249,35 +12816,42 @@

    Confidentiality Breach

    -
    -

    Confidentiality Concept

    + + + + + +
    +

    Equipment Malfunction

    TermConfidentialityBreachEquipmentFailure Prefix risk
    LabelConfidentiality BreachEquipment Failure
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Confidentiality BreachConcept representing Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    - + - + - + - + - @@ -8290,25 +12864,31 @@

    Confidentiality Concept

    - + - + - + + + + - + - + + + + @@ -8317,7 +12897,7 @@

    Confidentiality Concept

    - @@ -8325,44 +12905,45 @@

    Confidentiality Concept

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Erroneous Use

    TermConfidentialityConceptEquipmentMalfunction Prefix risk
    LabelConfidentiality ConceptEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcepthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec modelConcept representing Equipment Malfunction
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impactHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8371,28 +12952,37 @@

    Confidentiality Incident

    - + - + + + + - + - - + + + + + + + + - @@ -8404,37 +12994,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    +
    +

    Ethnic Discrimination

    TermConfidentialityIncidentErroneousUse Prefix risk
    LabelConfidentiality IncidentErroneous Use
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#ErroneousUse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affectedConcept representing erroneous use (of something)
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8447,29 +13038,23 @@

    Confirmation Bias

    - + - - - - + - + - - - - + @@ -8486,38 +13071,37 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    +
    +

    Excellence Discrimination

    TermConfirmationBiasEthnicDiscrimination Prefix risk
    LabelConfirmation BiasEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationDiscrimination against individuals based on their ethnicity or cultural heritage
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -8530,29 +13114,23 @@

    Confounding Variables Bias

    - + - - - - + - + - - - - + @@ -8566,47 +13144,46 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    + + + + + +
    +

    Exposure to Harmful Speech

    TermConfoundingVariablesBiasExcellenceDiscrimination Prefix risk
    LabelConfounding Variables BiasExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8615,22 +13192,31 @@

    Consequence Control

    - + - + + + + - + + + + - + - + + + + @@ -8639,7 +13225,7 @@

    Consequence Control

    - @@ -8648,47 +13234,41 @@

    Consequence Control

    -
    -

    Containment Control

    + +
    +

    External Security Threat

    TermConsequenceControlExposureToHarmfulSpeech Prefix risk
    LabelConsequence ControlExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the ConsequencesConcept representing Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8697,7 +13277,7 @@

    Containment Control

    - + @@ -8708,17 +13288,14 @@

    Containment Control

    - - - - + - @@ -8729,35 +13306,40 @@

    Containment Control

    -
    -

    Copyright Violation

    + + +
    +

    Extorsion

    TermContainmentControlExternalSecurityThreat Prefix risk
    LabelContainment ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain eventConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8770,7 +13352,7 @@

    Copyright Violation

    - + @@ -8779,7 +13361,7 @@

    Copyright Violation

    - + @@ -8806,51 +13388,47 @@

    Copyright Violation

    TermCopyrightViolationExtorsion Prefix risk
    LabelCopyright ViolationExtorsion
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ViolatingObligation + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationConcept representing Extorsion
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - - - - - -
    -

    Coverage Bias

    +
    +

    Extremely High Likelihood

    - + - + - + - + - - + + + + @@ -8859,34 +13437,34 @@

    Coverage Bias

    - + - + + + + - - - - + - + - + - @@ -8894,42 +13472,43 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Extremely High Risk

    TermCoverageBiasExtremelyHighLikelihood Prefix risk
    LabelCoverage BiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -8940,9 +13519,12 @@

    Cross-Border Incident

    - + - + + + + @@ -8953,15 +13535,18 @@

    Cross-Border Incident

    - + - + + + + - @@ -8970,44 +13555,44 @@

    Cross-Border Incident

    - - - -
    -

    Cryptojacking

    +
    +

    Extremely High Severity

    TermCrossBorderIncidentExtremelyHighRisk Prefix risk
    LabelCross-Border IncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionIncident involving cross-border or multiple jurisdictionsLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9016,28 +13601,25 @@

    Cryptojacking

    - + - + + + + - - - - + - + - - - - + @@ -9046,7 +13628,7 @@

    Cryptojacking

    - @@ -9055,43 +13637,44 @@

    Cryptojacking

    - - - -
    -

    Damage

    +
    +

    Extremely Low Likelihood

    TermCryptojackingExtremelyHighSeverity Prefix risk
    LabelCryptojackingExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CryptojackingLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Threat Landscape 2021
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9100,9 +13683,12 @@

    Damage

    - + - + + + + @@ -9113,12 +13699,9 @@

    Damage

    - + - - - - + @@ -9127,7 +13710,7 @@

    Damage

    - @@ -9136,44 +13719,44 @@

    Damage

    - - - -
    -

    Data Aggregation Bias

    +
    +

    Extremely Low Risk

    TermDamageExtremelyLowLikelihood Prefix risk
    LabelDamageExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes DamageLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9182,34 +13765,34 @@

    Data Aggregation Bias

    - + - + + + + - - - - + - + - + - @@ -9218,43 +13801,44 @@

    Data Aggregation Bias

    - - - -
    -

    Data Bias

    +
    +

    Extremely Low Severity

    TermDataAggregationBiasExtremelyLowRisk Prefix risk
    LabelData Aggregation BiasExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9263,34 +13847,34 @@

    Data Bias

    - + - + + + + - - - - + - + - + - @@ -9302,39 +13886,35 @@

    Data Bias

    - - - -
    -

    Data Breach

    +
    +

    Financial Impact

    TermDataBiasExtremelyLowSeverity Prefix risk
    LabelData BiasExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -9348,40 +13928,28 @@

    Data Breach

    - + - - - - - - - + - + - - - - - - - - + + - @@ -9393,36 +13961,36 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Financial Loss

    TermDataBreachFinancialImpact Prefix risk
    LabelData BreachFinancial Impact
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Data BreachThings that cause or have the potential to impact financial resources
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9436,12 +14004,9 @@

    Data Corruption

    - + - - - - + @@ -9481,37 +14046,35 @@

    Data Corruption

    -
    -

    Data Processing Bias

    +
    +

    Floods

    TermDataCorruptionFinancialLoss Prefix risk
    LabelData CorruptionFinancial Loss
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialImpact + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Corruption of DataConcept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    - + - + - + - + - @@ -9524,29 +14087,23 @@

    Data Processing Bias

    - + - - - - + - + - - - - + @@ -9559,44 +14116,47 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + + + + + +
    +

    Fraud

    TermDataProcessingBiasFloods Prefix risk
    LabelData Processing BiasFloods
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#Floods
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasThe occurence or potential occurence of floods
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9605,28 +14165,37 @@

    Deliberate Incident

    - + - + + + + - + - - + + + + + + + + - @@ -9638,36 +14207,37 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    Gender Discrimination

    TermDeliberateIncidentFraud Prefix risk
    LabelDeliberate IncidentFraud
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to deliberate actions of a humanConcept representing Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9681,32 +14251,23 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + @@ -9720,47 +14281,44 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    + + + +
    +

    Geographic Discrimination

    TermDenialServiceAttackGenderDiscrimination Prefix risk
    LabelDenial of Service Attack (DoS)Gender Discrimination
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Discrimination based on a person's gender identity or gender expression
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9769,7 +14327,7 @@

    Detection Control

    - + @@ -9782,7 +14340,7 @@

    Detection Control

    - + @@ -9790,7 +14348,7 @@

    Detection Control

    - @@ -9801,35 +14359,38 @@

    Detection Control

    -
    -

    Detriment

    + +
    +

    Group Attribution Bias

    TermDetectionControlGeographicDiscrimination Prefix risk
    LabelDetection ControlGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to detect eventDiscrimination based on a person's geographical origin or residence
    Date Created2024-05-192024-09-30
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9843,28 +14404,28 @@

    Detriment

    - + - + + + + - + - - - - + - + @@ -9882,40 +14443,35 @@

    Detriment

    -
    -

    Direct Discrimination

    +
    +

    Societal Risk

    TermDetrimentGroupAttributionBias Prefix risk
    LabelDetrimentGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes DetrimentBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -9929,7 +14485,7 @@

    Direct Discrimination

    - + @@ -9940,10 +14496,7 @@

    Direct Discrimination

    - - - - + @@ -9959,48 +14512,48 @@

    Direct Discrimination

    - - - -
    -

    Disability Discrimination

    +
    +

    Halt Source

    TermDirectDiscriminationGroupRisk Prefix risk
    LabelDirect DiscriminationSocietal Risk
    IRIhttps://w3id.org/dpv/risk#DirectDiscriminationhttps://w3id.org/dpv/risk#GroupRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)Risks and issues that affect or have the potential to affect groups in society
    Date Created2024-09-30
    - + - + - + - + - - - - + + + + @@ -10009,7 +14562,7 @@

    Disability Discrimination

    - + @@ -10022,15 +14575,18 @@

    Disability Discrimination

    - + - + + + + - @@ -10042,39 +14598,37 @@

    Disability Discrimination

    - -
    -

    Discrimination

    +
    +

    Harassment

    TermDisabilityDiscriminationHaltSource Prefix risk
    LabelDisability DiscriminationHalt Source
    IRIhttps://w3id.org/dpv/risk#DisabilityDiscriminationhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on physical or mental disabilitiesControl that halts the risk source or prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10086,10 +14640,7 @@

    Discrimination

    - - - - + @@ -10099,18 +14650,9 @@

    Discrimination

    - - - - - - - - - - - - + + + @@ -10127,37 +14669,36 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Harm

    TermDiscriminationHarassment Prefix risk
    LabelDiscriminationHarassment
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept -
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Definition[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2024-09-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    - + - + - + - + - @@ -10171,23 +14712,23 @@

    Distributed Denial of Service Attack (DDoS)

    - + - + + + + - - - - + - + @@ -10209,42 +14750,61 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    + + + + + + + + + + + +
    +

    High Likelihood

    TermDistributedDenialServiceAttackHarm Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Harm
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DenialServiceAttack - → risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Concept representing Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-13
    Date Modified
    - + - + - + - + - + + + + - @@ -10255,9 +14815,12 @@

    Environmental Incident

    - + - + + + + @@ -10268,15 +14831,18 @@

    Environmental Incident

    - + - + + + + - @@ -10285,42 +14851,52 @@

    Environmental Incident

    - - - -
    -

    Environmental Risk

    +
    +

    High Risk

    TermEnvironmentalIncidentHighLikelihood Prefix risk
    LabelEnvironmental IncidentHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to environmental factors outside human controlsLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10329,9 +14905,12 @@

    Environmental Risk

    - + - + + + + @@ -10340,14 +14919,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -10356,44 +14941,52 @@

    Environmental Risk

    - - - - -
    -

    Equipment Failure

    +
    +

    High Severity

    TermEnvironmentalRiskHighRisk Prefix risk
    LabelEnvironmental RiskHigh Risk
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10402,31 +14995,25 @@

    Equipment Failure

    - + - + - - - - + - + - - - - + @@ -10435,7 +15022,7 @@

    Equipment Failure

    - @@ -10447,36 +15034,37 @@

    Equipment Failure

    - -
    -

    Equipment Malfunction

    +
    +

    Homophobia

    TermEquipmentFailureHighSeverity Prefix risk
    LabelEquipment FailureHigh Severity
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Equipment FailureLevel where Severity is High
    Usage NoteHere equipment refers to physical equipmentThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -10490,35 +15078,23 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - - - - - + + @@ -10535,23 +15111,23 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Human Errors

    TermEquipmentMalfunctionHomophobia Prefix risk
    LabelEquipment MalfunctionHomophobia
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Equipment MalfunctionHostility or prejudice against individuals who are or are perceived to be homosexual
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -10564,6 +15140,7 @@

    Erroneous System Use

    @@ -10577,7 +15154,7 @@

    Erroneous System Use

    - + @@ -10586,7 +15163,7 @@

    Erroneous System Use

    - + @@ -10616,50 +15193,47 @@

    Erroneous System Use

    - - - -
    -

    Ethnic Discrimination

    +
    +

    Identification Control

    TermErroneousSystemUseHumanErrors Prefix risk
    LabelErroneous System UseHuman Errors
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#HumanErrors
    Broader/Parent types risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Erroneous System UseConcept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - - - - + + + + @@ -10668,7 +15242,7 @@

    Ethnic Discrimination

    - + @@ -10681,7 +15255,7 @@

    Ethnic Discrimination

    - + @@ -10689,7 +15263,7 @@

    Ethnic Discrimination

    - @@ -10701,40 +15275,38 @@

    Ethnic Discrimination

    -
    -

    Excellence Discrimination

    + +
    +

    Identity Fraud

    TermEthnicDiscriminationIdentificationControl Prefix risk
    LabelEthnic DiscriminationIdentification Control
    IRIhttps://w3id.org/dpv/risk#EthnicDiscriminationhttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on their ethnicity or cultural heritageControl to identify characteristics of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10748,23 +15320,32 @@

    Excellence Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -10782,36 +15363,37 @@

    Excellence Discrimination

    - -
    -

    Exposure to Harmful Speech

    +
    +

    Identity Theft

    TermExcellenceDiscriminationIdentityFraud Prefix risk
    LabelExcellence DiscriminationIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#ExcellenceDiscriminationhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of othersConcept representing Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -10825,19 +15407,16 @@

    Exposure to Harmful Speech

    - + - - - - + - + @@ -10868,35 +15447,39 @@

    Exposure to Harmful Speech

    -
    -

    External Security Threat

    + + +
    +

    Identity Verification Failure

    TermExposureToHarmfulSpeechIdentityTheft Prefix risk
    LabelExposure to Harmful SpeechIdentity Theft
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Harmful SpeechConcept representing Identity Theft
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - + - + - + - + - @@ -10909,7 +15492,7 @@

    External Security Threat

    - + @@ -10920,7 +15503,10 @@

    External Security Threat

    - + + + + @@ -10938,38 +15524,36 @@

    External Security Threat

    - - -
    -

    Extorsion

    +
    +

    Illegal Data Processing

    TermExternalSecurityThreatIdentityVerificationFailure Prefix risk
    LabelExternal Security ThreatIdentity Verification Failure
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IdentityVerificationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcepts associated with security threats that are likely to originate externallyConcept representing failure to verify identity
    Date Created2024-10-21
    - + - + - + - + - @@ -10983,16 +15567,19 @@

    Extorsion

    - + - + + + + - + @@ -11022,42 +15609,45 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Impact Control

    TermExtorsionIllegalDataProcessing Prefix risk
    LabelExtorsionIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ExtorsionConcept representing Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    - + - + - + - + - - @@ -11068,12 +15658,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -11084,7 +15671,7 @@

    Extremely High Likelihood

    - + @@ -11095,7 +15682,7 @@

    Extremely High Likelihood

    - @@ -11104,126 +15691,45 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    -
    TermExtremelyHighLikelihoodImpactControl Prefix risk
    LabelExtremely High LikelihoodImpact Control
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is Extremely HighRisk Mitigation Measure that controls Impacts
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighRiskPrefixrisk
    LabelExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Extremely High Severity

    +
    +

    Implicit Bias

    - + - + - + - + - - - - - + @@ -11232,34 +15738,34 @@

    Extremely High Severity

    - + - - - - + - + + + + - + - + - @@ -11268,44 +15774,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    + + + +
    +

    Inability to Enter Into Contract

    TermExtremelyHighSeverityImplicitBias Prefix risk
    LabelExtremely High SeverityImplicit Bias
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighBias that occurs when a human makes an association or assumption based on their mental models and memories
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11314,12 +15820,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -11330,18 +15833,15 @@

    Extremely Low Likelihood

    - + - - - - + - @@ -11350,44 +15850,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    + + + +
    +

    Inability to Establish Legal Claims

    TermExtremelyLowLikelihoodInabilityToEnterIntoContract Prefix risk
    LabelExtremely Low LikelihoodInability to Enter Into Contract
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#InabilityToEnterIntoContract
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11396,12 +15896,9 @@

    Extremely Low Risk

    - + - - - - + @@ -11412,18 +15909,15 @@

    Extremely Low Risk

    - + - - - - + - @@ -11432,44 +15926,44 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    + + + +
    +

    Inability to Fulfill Legal Obligations

    TermExtremelyLowRiskInabilityToEstablishLegalClaims Prefix risk
    LabelExtremely Low RiskInability to Establish Legal Claims
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#InabilityToEstablishLegalClaims
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11478,12 +15972,9 @@

    Extremely Low Severity

    - + - - - - + @@ -11494,18 +15985,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -11517,23 +16005,23 @@

    Extremely Low Severity

    -
    -

    Financial Impact

    +
    +

    Inability to Process Payments

    TermExtremelyLowSeverityInabilityToFulfillLegalObligations Prefix risk
    LabelExtremely Low SeverityInability to Fulfill Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#InabilityToFulfillLegalObligations
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -11545,7 +16033,9 @@

    Financial Impact

    - @@ -11558,7 +16048,7 @@

    Financial Impact

    - + @@ -11569,7 +16059,10 @@

    Financial Impact

    - + + + + @@ -11588,23 +16081,23 @@

    Financial Impact

    -
    -

    Financial Loss

    +
    +

    Inability to Protect Vital Interests

    TermFinancialImpactInabilityToProcessPayments Prefix risk
    LabelFinancial ImpactInability to Process Payments
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#InabilityToProcessPayments
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesStub
    Date Created2024-10-21
    - + - + - + @@ -11616,7 +16109,8 @@

    Financial Loss

    - @@ -11630,32 +16124,23 @@

    Financial Loss

    - + - - - - + - + - - - - - - - - + + @@ -11672,37 +16157,36 @@

    Financial Loss

    - -
    -

    Fraud

    +
    +

    Inability to Provide Health Care

    TermFinancialLossInabilityToProtectVitalInterests Prefix risk
    LabelFinancial LossInability to Protect Vital Interests
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#InabilityToProtectVitalInterests
    Broader/Parent types risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -11716,32 +16200,23 @@

    Fraud

    - + - - - - + - + - - - - - - - - + + @@ -11754,51 +16229,43 @@

    Fraud

    - - - - -
    -

    Gender Discrimination

    +
    +

    Incident

    TermFraudInabilityToProvideHealthCare Prefix risk
    LabelFraudInability to Provide Health Care
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#InabilityToProvideHealthCare
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes FraudStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -11807,10 +16274,16 @@

    Gender Discrimination

    - + + + + + - + + + @@ -11820,65 +16293,73 @@

    Gender Discrimination

    - + - - + + + + + + + + -
    TermGenderDiscriminationIncident Prefix risk
    LabelGender DiscriminationIncident
    IRIhttps://w3id.org/dpv/risk#GenderDiscriminationhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionDiscrimination based on a person's gender identity or gender expressionAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-09-302024-02-14
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-TAXONOMY in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - - - - -
    -

    Geographic Discrimination

    +
    +

    Incident Assessment Report

    - + - + - + - + - - - - + + + + @@ -11887,7 +16368,7 @@

    Geographic Discrimination

    - + @@ -11900,7 +16381,7 @@

    Geographic Discrimination

    - + @@ -11908,7 +16389,7 @@

    Geographic Discrimination

    - @@ -11917,44 +16398,46 @@

    Geographic Discrimination

    - - - -
    -

    Group Attribution Bias

    +
    +

    Incident Concluded

    TermGeographicDiscriminationIncidentAssessmentReport Prefix risk
    LabelGeographic DiscriminationIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#GeographicDiscriminationhttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionDiscrimination based on a person's geographical origin or residenceA report describing the assessment of an incident in terms of its effects or impacts
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -11963,34 +16446,31 @@

    Group Attribution Bias

    - + - - - - + - + - + - @@ -11998,47 +16478,46 @@

    Group Attribution Bias

    - -
    -

    Halt Source

    +
    +

    Incident Concluding Report

    TermGroupAttributionBiasIncidentConcluded Prefix risk
    LabelGroup Attribution BiasIncident Concluded
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -12049,7 +16528,7 @@

    Halt Source

    - + @@ -12065,15 +16544,12 @@

    Halt Source

    - - - - + - @@ -12081,51 +16557,58 @@

    Halt Source

    - - - - -
    -

    Harassment

    +
    +

    Incident Detection Report

    TermHaltSourceIncidentConcludingReport Prefix risk
    LabelHalt SourceIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl that halts the risk source or prevents it from materialisingA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + - + + + + @@ -12135,14 +16618,17 @@

    Harassment

    - + + + + - @@ -12151,42 +16637,46 @@

    Harassment

    - - - -
    -

    Harm

    +
    +

    Incident Halted

    TermHarassmentIncidentDetectionReport Prefix risk
    LabelHarassmentIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#Harassmenthttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionA report describing the detection of a Incident
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12195,12 +16685,9 @@

    Harm

    - + - - - - + @@ -12211,12 +16698,9 @@

    Harm

    - + - - - - + @@ -12225,7 +16709,7 @@

    Harm

    - @@ -12233,61 +16717,46 @@

    Harm

    - - - - - - - - - - - -
    -

    High Likelihood

    +
    +

    Incident Handling Report

    TermHarmIncidentHalted Prefix risk
    LabelHarmIncident Halted
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IndividualRisk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harm to humansThe incident has halted or paused with a high likelihood of resuming or recurring
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2022-08-132024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - @@ -12298,12 +16767,9 @@

    High Likelihood

    - + - - - - + @@ -12314,18 +16780,15 @@

    High Likelihood

    - + - - - - + - @@ -12333,53 +16796,36 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Incident Identifier

    TermHighLikelihoodIncidentHandlingReport Prefix risk
    LabelHigh LikelihoodIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is HighA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - + - - - - + @@ -12388,12 +16834,9 @@

    High Risk

    - + - - - - + @@ -12404,18 +16847,15 @@

    High Risk

    - + - - - - + - @@ -12423,51 +16863,49 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Incident Impact Assessment

    TermHighRiskIncidentIdentifier Prefix risk
    LabelHigh RiskIncident Identifier
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIdentifier associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - @@ -12478,12 +16916,9 @@

    High Severity

    - + - - - - + @@ -12494,7 +16929,7 @@

    High Severity

    - + @@ -12505,7 +16940,7 @@

    High Severity

    - @@ -12514,50 +16949,46 @@

    High Severity

    - - - -
    -

    Homophobia

    +
    +

    Incident Mitigated

    TermHighSeverityIncidentImpactAssessment Prefix risk
    LabelHigh SeverityIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is HighAn impact assessment associated with a incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -12566,7 +16997,7 @@

    Homophobia

    - + @@ -12579,15 +17010,18 @@

    Homophobia

    - + - + + + + - @@ -12595,44 +17029,45 @@

    Homophobia

    - - - - -
    -

    Human Errors

    +
    +

    Incident Mitigation Measure

    TermHomophobiaIncidentMitigated Prefix risk
    LabelHomophobiaIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#Homophobiahttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionHostility or prejudice against individuals who are or are perceived to be homosexualThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-09-302024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12641,37 +17076,28 @@

    Human Errors

    - + - - - - + - + - - - - - - - - + + - @@ -12680,45 +17106,44 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Incident Near Miss

    TermHumanErrorsIncidentMitigationMeasure Prefix risk
    LabelHuman ErrorsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Human ErrorsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -12729,7 +17154,7 @@

    Identification Control

    - + @@ -12742,15 +17167,18 @@

    Identification Control

    - + - + + + + - @@ -12758,46 +17186,47 @@

    Identification Control

    - - - - - -
    -

    Identity Fraud

    +
    +

    Incident Notice

    TermIdentificationControlIncidentNearMiss Prefix risk
    LabelIdentification ControlIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasContext, + dpv:hasStatus
    DefinitionControl to identify characteristics of eventThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12806,37 +17235,28 @@

    Identity Fraud

    - + - - - - + - + - - - - - - - - + + - @@ -12845,45 +17265,46 @@

    Identity Fraud

    - - - - -
    -

    Identity Theft

    +
    +

    Incident Ongoing

    TermIdentityFraudIncidentNotice Prefix risk
    LabelIdentity FraudIncident Notice
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Identity FraudNotice associated with an Incident
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12892,28 +17313,22 @@

    Identity Theft

    - + - - - - + - + - - - - + @@ -12922,7 +17337,7 @@

    Identity Theft

    - @@ -12930,43 +17345,48 @@

    Identity Theft

    - - - -
    -

    Illegal Data Processing

    +
    +

    Incident Ongoing Report

    TermIdentityTheftIncidentOngoing Prefix risk
    LabelIdentity TheftIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Identity TheftThe incident is ongoing i.e. still active
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12975,40 +17395,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -13016,46 +17424,46 @@

    Illegal Data Processing

    - -
    -

    Impact Control

    +
    +

    Incident Preliminary Report

    TermIllegalDataProcessingIncidentOngoingReport Prefix risk
    LabelIllegal Data ProcessingIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Illegal Processing of DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -13066,7 +17474,7 @@

    Impact Control

    - + @@ -13082,15 +17490,12 @@

    Impact Control

    - - - - + - @@ -13098,45 +17503,47 @@

    Impact Control

    - - - - -
    -

    Implicit Bias

    +
    +

    Incident Register

    TermImpactControlIncidentPreliminaryReport Prefix risk
    LabelImpact ControlIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that controls ImpactsA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -13145,34 +17552,31 @@

    Implicit Bias

    - + - - - - + - + - + - @@ -13180,23 +17584,23 @@

    Implicit Bias

    -
    -

    Incident

    +
    +

    Incident Report

    TermImplicitBiasIncidentRegister Prefix risk
    LabelImplicit BiasIncident Register
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesA register recording incidentes, their reports, notifications, and other related activities
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + @@ -13208,13 +17612,17 @@

    Incident

    - - @@ -13225,16 +17633,10 @@

    Incident

    - + - - - - - - - + @@ -13246,46 +17648,37 @@

    Incident

    - - - - - - - - + + -
    TermIncidentIncidentReport Prefix risk
    LabelIncidentIncident Report
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentReport
    Broader/Parent types dpv:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionAn actual or occured eventDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-05-19
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT in RISK
    - - -
    -

    Incident Assessment Report

    +
    +

    Incident Status

    - + - + - + @@ -13297,18 +17690,15 @@

    Incident Assessment Report

    - - @@ -13319,10 +17709,13 @@

    Incident Assessment Report

    - + + + + @@ -13332,15 +17725,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -13349,23 +17745,23 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Incident Status Unknown

    TermIncidentAssessmentReportIncidentStatus Prefix risk
    LabelIncident Assessment ReportIncident Status
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
    - + - + - + @@ -13397,7 +17793,7 @@

    Incident Concluded

    - + @@ -13429,46 +17825,45 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Incident Suspected

    TermIncidentConcludedIncidentStatusUnknown Prefix risk
    LabelIncident ConcludedIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe status of a incident is unknown
    - + - + - + - + - - @@ -13479,7 +17874,7 @@

    Incident Concluding Report

    - + @@ -13492,15 +17887,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -13508,23 +17906,23 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    +
    +

    Incident Suspected Report

    TermIncidentConcludingReportIncidentSuspected Prefix risk
    LabelIncident Concluding ReportIncident Suspected
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13558,7 +17956,7 @@

    Incident Detection Report

    - + @@ -13588,23 +17986,23 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Incident Terminated

    TermIncidentDetectionReportIncidentSuspectedReport Prefix risk
    LabelIncident Detection ReportIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentSuspectedReport
    DefinitionA report describing the detection of a IncidentA report describing the suspicion of an incident in the past or occuring
    - + - + - + @@ -13636,7 +18034,7 @@

    Incident Halted

    - + @@ -13668,48 +18066,45 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + + + + +
    +

    Indirect Discrimination

    TermIncidentHaltedIncidentTerminated Prefix risk
    LabelIncident HaltedIncident Terminated
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentTerminated
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + @@ -13718,7 +18113,7 @@

    Incident Handling Report

    - + @@ -13731,7 +18126,7 @@

    Incident Handling Report

    - + @@ -13739,7 +18134,7 @@

    Incident Handling Report

    - @@ -13747,33 +18142,42 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + + + + +
    +

    Individual Health & Safety

    TermIncidentHandlingReportIndirectDiscrimination Prefix risk
    LabelIncident Handling ReportIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + @@ -13783,10 +18187,7 @@

    Incident Identifier

    - - - - + @@ -13796,17 +18197,14 @@

    Incident Identifier

    - - - - + - @@ -13814,51 +18212,44 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + + + + +
    +

    Individual Risk

    TermIncidentIdentifierIndividualHealthSafety Prefix risk
    LabelIncident IdentifierIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13867,7 +18258,7 @@

    Incident Impact Assessment

    - + @@ -13878,20 +18269,14 @@

    Incident Impact Assessment

    - - - - + - - - - + - @@ -13900,46 +18285,42 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Informativeness Bias

    TermIncidentImpactAssessmentIndividualRisk Prefix risk
    LabelIncident Impact AssessmentIndividual Risk
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentRisks and issues that affect or have the potential to affect specific individuals
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13948,31 +18329,34 @@

    Incident Mitigated

    - + - + + + + - + - + - @@ -13980,45 +18364,46 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + +
    +

    In-Group Bias

    TermIncidentMitigatedInformativenessBias Prefix risk
    LabelIncident MitigatedInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:EngineeringDecisionBias
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    Source
    Date Created2024-02-142024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14027,28 +18412,34 @@

    Incident Mitigation Measure

    - + - + + + + - + - + + + + - @@ -14057,46 +18448,45 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + +
    +

    Injury

    TermIncidentMitigationMeasureInGroupBias Prefix risk
    LabelIncident Mitigation MeasureIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14105,22 +18495,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -14129,7 +18525,7 @@

    Incident Near Miss

    - @@ -14137,57 +18533,55 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + + +
    +

    None

    TermIncidentNearMissInjury Prefix risk
    LabelIncident Near MissInjury
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Concept representing Injury
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + - - - - + @@ -14197,17 +18591,14 @@

    Incident Notice

    - - - - + - @@ -14215,47 +18606,39 @@

    Incident Notice

    - -
    -

    Incident Ongoing

    +
    +

    Integrity Concept

    TermIncidentNoticeIntegrityBreach Prefix risk
    LabelIncident NoticeNone
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an Incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14264,9 +18647,12 @@

    Incident Ongoing

    - + - + + + + @@ -14277,7 +18663,7 @@

    Incident Ongoing

    - + @@ -14288,7 +18674,7 @@

    Incident Ongoing

    - @@ -14296,23 +18682,23 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    +
    +

    Integrity Incident

    TermIncidentOngoingIntegrityConcept Prefix risk
    LabelIncident OngoingIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-02-142024-09-29
    See More: section INCIDENT-STATUS in RISK + section CORE in RISK
    - + - + - + @@ -14324,18 +18710,14 @@

    Incident Ongoing Report

    - - @@ -14346,7 +18728,7 @@

    Incident Ongoing Report

    - + @@ -14375,48 +18757,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Intentional Misuse

    TermIncidentOngoingReportIntegrityIncident Prefix risk
    LabelIncident Ongoing ReportIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#IntegrityIncident
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + risk:hasIncident
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedIncident where the integrity of information or system has been affected
    - + - + - + - + - - - - - + @@ -14425,7 +18805,7 @@

    Incident Preliminary Report

    - + @@ -14436,17 +18816,14 @@

    Incident Preliminary Report

    - - - - + - @@ -14454,47 +18831,47 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + + + + + +
    +

    Intercept Communications

    TermIncidentPreliminaryReportIntentionalMisuse Prefix risk
    LabelIncident Preliminary ReportIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownConcept represent an intentional misuse (of something)
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14503,22 +18880,31 @@

    Incident Register

    - + - + + + + - + + + + - + - + + + + @@ -14527,7 +18913,7 @@

    Incident Register

    - @@ -14535,47 +18921,50 @@

    Incident Register

    -
    -

    Incident Report

    + + + + + + + + +
    +

    Judicial Costs

    TermIncidentRegisterInterceptCommunications Prefix risk
    LabelIncident RegisterIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesConcept representing Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14584,7 +18973,7 @@

    Incident Report

    - + @@ -14595,17 +18984,14 @@

    Incident Report

    - - - - + - @@ -14613,45 +18999,46 @@

    Incident Report

    -
    -

    Incident Status

    + + + + +
    +

    Judicial Penalty

    TermIncidentReportJudicialCosts Prefix risk
    LabelIncident ReportJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that involves or causes judicial costs to be paid
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14660,13 +19047,10 @@

    Incident Status

    - + - - - @@ -14674,20 +19058,14 @@

    Incident Status

    - - - - + - - - - + - @@ -14696,46 +19074,44 @@

    Incident Status

    -
    -

    Incident Status Unknown

    + + + +
    +

    Language Discrimination

    TermIncidentStatusJudicialPenalty Prefix risk
    LabelIncident StatusJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Status - → dpv:Context + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that involves or causes judicial penalties to be paid
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14744,7 +19120,7 @@

    Incident Status Unknown

    - + @@ -14757,18 +19133,15 @@

    Incident Status Unknown

    - + - - - - + - @@ -14777,46 +19150,42 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    + + +
    +

    Legal Compliance Risk

    TermIncidentStatusUnknownLanguageDiscrimination Prefix risk
    LabelIncident Status UnknownLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe status of a incident is unknownDiscrimination based on a person's language, often linked to national origin or ethnicity
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14825,7 +19194,7 @@

    Incident Suspected

    - + @@ -14836,20 +19205,14 @@

    Incident Suspected

    - - - - + - - - - + - @@ -14857,48 +19220,44 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + + + + +
    +

    Legally Relevant Consequence

    TermIncidentSuspectedLegalComplianceRisk Prefix risk
    LabelIncident SuspectedLegal Compliance Risk
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#LegalComplianceRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisks and consequences regarding legal compliance and its violation
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14907,7 +19266,7 @@

    Incident Suspected Report

    - + @@ -14918,17 +19277,14 @@

    Incident Suspected Report

    - - - - + - @@ -14937,46 +19293,43 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    + + + + +
    +

    Legal Risk Concept

    TermIncidentSuspectedReportLegallyRelevantConsequence Prefix risk
    LabelIncident Suspected ReportLegally Relevant Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#LegallyRelevantConsequence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the suspicion of an incident in the past or occuringA consequence that is legally relevant i.e. actionable under law
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14985,9 +19338,12 @@

    Incident Terminated

    - + - + + + + @@ -14998,18 +19354,15 @@

    Incident Terminated

    - + - - - - + - @@ -15021,40 +19374,36 @@

    Incident Terminated

    -
    -

    Indirect Discrimination

    +
    +

    Legal Support Limited

    TermIncidentTerminatedLegalRiskConcept Prefix risk
    LabelIncident TerminatedLegal Risk Concept
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#LegalRiskConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringRisk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process
    Usage NoteLegal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -15068,7 +19417,7 @@

    Indirect Discrimination

    - + @@ -15081,7 +19430,7 @@

    Indirect Discrimination

    - + @@ -15101,23 +19450,23 @@

    Indirect Discrimination

    -
    -

    Individual Health & Safety

    +
    +

    Lose of Credibility

    TermIndirectDiscriminationLegalSupportLimited Prefix risk
    LabelIndirect DiscriminationLegal Support Limited
    IRIhttps://w3id.org/dpv/risk#IndirectDiscriminationhttps://w3id.org/dpv/risk#LegalSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justifiedStub
    Date Created2024-09-302024-10-21
    - + - + - + @@ -15129,7 +19478,9 @@

    Individual Health & Safety

    - @@ -15140,19 +19491,34 @@

    Individual Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15168,33 +19534,39 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Lose of Customer Confidence

    TermIndividualHealthSafetyLoseCredibility Prefix risk
    LabelIndividual Health & SafetyLose of Credibility
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LoseCredibility
    Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcept representing Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - + + + @@ -15206,20 +19578,32 @@

    Individual Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -15236,35 +19620,37 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Lose of Goodwill

    TermIndividualRiskLoseCustomerConfidence Prefix risk
    LabelIndividual RiskLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsConcept representing Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15277,7 +19663,7 @@

    Informativeness Bias

    - + @@ -15286,19 +19672,22 @@

    Informativeness Bias

    - + - + - + + + + - + @@ -15316,37 +19705,37 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    +
    +

    Lose of Negotiating Capacity

    TermInformativenessBiasLoseGoodwill Prefix risk
    LabelInformativeness BiasLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:EngineeringDecisionBias + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupConcept representing Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - @@ -15359,7 +19748,7 @@

    In-Group Bias

    - + @@ -15368,19 +19757,22 @@

    In-Group Bias

    - + - + - + + + + - + @@ -15398,23 +19790,23 @@

    In-Group Bias

    -
    -

    Injury

    +
    +

    Lose of Opportunity

    TermInGroupBiasLoseNegotiatingCapacity Prefix risk
    LabelIn-Group BiasLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsConcept representing Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + @@ -15426,8 +19818,9 @@

    Injury

    - @@ -15440,7 +19833,7 @@

    Injury

    - + @@ -15482,38 +19875,36 @@

    Injury

    - -
    -

    None

    +
    +

    Lose of Reputation

    TermInjuryLoseOpportunity Prefix risk
    LabelInjuryLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseOpportunity
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjuryConcept representing Loss of Opportunity
    - + - + - + - + - @@ -15525,19 +19916,34 @@

    None

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15550,35 +19956,41 @@

    None

    -
    -

    Integrity Concept

    + + + + +
    +

    Lose of Trust

    TermIntegrityBreachLoseReputation Prefix risk
    LabelNoneLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionConcept representing Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15591,25 +20003,28 @@

    Integrity Concept

    - + - - - - + - + + + + - + - + + + + @@ -15618,7 +20033,7 @@

    Integrity Concept

    - @@ -15626,42 +20041,51 @@

    Integrity Concept

    -
    -

    Integrity Incident

    + +
    +

    Low Likelihood

    TermIntegrityConceptLoseTrust Prefix risk
    LabelIntegrity ConceptLose of Trust
    IRIhttps://w3id.org/dpv/risk#IntegrityConcepthttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Integrity' in CIA InfoSec modelConcept representing Loss of Trust
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -15672,9 +20096,12 @@

    Integrity Incident

    - + - + + + + @@ -15685,15 +20112,18 @@

    Integrity Incident

    - + - + + + + - @@ -15702,44 +20132,52 @@

    Integrity Incident

    - - - -
    -

    Intentional Misuse

    +
    +

    Low Risk

    TermIntegrityIncidentLowLikelihood Prefix risk
    LabelIntegrity IncidentLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident where the integrity of information or system has been affectedLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15748,9 +20186,12 @@

    Intentional Misuse

    - + - + + + + @@ -15759,14 +20200,20 @@

    Intentional Misuse

    - + + + + - + + + + - @@ -15775,45 +20222,52 @@

    Intentional Misuse

    - - - - -
    -

    Intercept Communications

    +
    +

    Low Severity

    TermIntentionalMisuseLowRisk Prefix risk
    LabelIntentional MisuseLow Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Misuse - → risk:UserRisks - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionIntentional MisuseLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15822,31 +20276,25 @@

    Intercept Communications

    - + - + - - - - + - + - - - - + @@ -15855,7 +20303,7 @@

    Intercept Communications

    - @@ -15867,27 +20315,23 @@

    Intercept Communications

    - - - - -
    -

    Judicial Costs

    +
    +

    Loyalty Program Exclusion

    TermInterceptCommunicationsLowSeverity Prefix risk
    LabelIntercept CommunicationsLow Severity
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Interception of CommunicationsLevel where Severity is Low
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + @@ -15899,8 +20343,8 @@

    Judicial Costs

    - @@ -15914,7 +20358,7 @@

    Judicial Costs

    - + @@ -15925,7 +20369,10 @@

    Judicial Costs

    - + + + + @@ -15944,36 +20391,36 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    +
    +

    Malicious Activity

    TermJudicialCostsLoyaltyProgramExclusion Prefix risk
    LabelJudicial CostsLoyalty Program Exclusion
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoyaltyProgramExclusion
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidStub
    Date Created2024-10-21
    - + - + - + - + - @@ -15987,7 +20434,7 @@

    Judicial Penalty

    - + @@ -16017,40 +20464,39 @@

    Judicial Penalty

    -
    -

    Language Discrimination

    + + +
    +

    Malicious Code Attack

    TermJudicialPenaltyMaliciousActivity Prefix risk
    LabelJudicial PenaltyMalicious Activity
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    - + - + - + - + - - - @@ -16064,23 +20510,32 @@

    Language Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -16096,35 +20551,41 @@

    Language Discrimination

    -
    -

    Legal Risk

    + + + +
    +

    Malware Attack

    TermLanguageDiscriminationMaliciousCodeAttack Prefix risk
    LabelLanguage DiscriminationMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#LanguageDiscriminationhttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's language, often linked to national origin or ethnicityConcept representing Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16137,20 +20598,32 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -16167,23 +20640,23 @@

    Legal Risk

    -
    -

    Lose of Credibility

    +
    +

    Material Damage

    TermLegalRiskMalwareAttack Prefix risk
    LabelLegal RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementConcept representing Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -16195,7 +20668,8 @@

    Lose of Credibility

    - @@ -16209,23 +20683,23 @@

    Lose of Credibility

    - + - + + + + - - - - + - + @@ -16251,35 +20725,37 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    +
    +

    Misandry

    TermLoseCredibilityMaterialDamage Prefix risk
    LabelLose of CredibilityMaterial Damage
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#MaterialDamage
    Broader/Parent types risk:ReputationalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of CredibilityConcept representing Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -16293,32 +20769,23 @@

    Lose of Customer Confidence

    - + - - - - + - + - - - - - - - - + + @@ -16335,35 +20802,37 @@

    Lose of Customer Confidence

    -
    -

    Lose of Goodwill

    +
    +

    Misogyny

    TermLoseCustomerConfidenceMisandry Prefix risk
    LabelLose of Customer ConfidenceMisandry
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Customer ConfidenceDislike, contempt, or prejudice against men
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16377,32 +20846,23 @@

    Lose of Goodwill

    - + - - - - + - + - - - - - - - - + + @@ -16419,35 +20879,36 @@

    Lose of Goodwill

    -
    -

    Lose of Negotiating Capacity

    +
    +

    Misuse

    TermLoseGoodwillMisogyny Prefix risk
    LabelLose of GoodwillMisogyny
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillDislike, contempt, or prejudice against women
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16461,23 +20922,20 @@

    Lose of Negotiating Capacity

    - + - - - - + - + @@ -16485,7 +20943,7 @@

    Lose of Negotiating Capacity

    - + @@ -16500,43 +20958,52 @@

    Lose of Negotiating Capacity

    - - - -
    -

    Lose of Opportunity

    +
    +

    Moderate Likelihood

    TermLoseNegotiatingCapacityMisuse Prefix risk
    LabelLose of Negotiating CapacityMisuse
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ReputationalRisk + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityConcept representing a misuse (of something)
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-06-11
    Date Modified
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    - + - + - + - + - + + + + - + + + + @@ -16545,28 +21012,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -16575,7 +21039,7 @@

    Lose of Opportunity

    - @@ -16584,43 +21048,52 @@

    Lose of Opportunity

    - - - -
    -

    Lose of Reputation

    +
    +

    Moderate Risk

    TermLoseOpportunityModerateLikelihood Prefix risk
    LabelLose of OpportunityModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Loss of OpportunityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16629,28 +21102,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -16659,7 +21129,7 @@

    Lose of Reputation

    - @@ -16668,43 +21138,52 @@

    Lose of Reputation

    - - - -
    -

    Lose of Trust

    +
    +

    Moderate Severity

    TermLoseReputationModerateRisk Prefix risk
    LabelLose of ReputationModerate Risk
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Loss of ReputationLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16713,28 +21192,25 @@

    Lose of Trust

    - + - + + + + - - - - + - + - - - - + @@ -16743,7 +21219,7 @@

    Lose of Trust

    - @@ -16752,50 +21228,46 @@

    Lose of Trust

    -
    -

    Low Likelihood

    +
    +

    Monitor Consequence

    TermLoseTrustModerateSeverity Prefix risk
    LabelLose of TrustModerate Severity
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Loss of TrustLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - @@ -16806,12 +21278,9 @@

    Low Likelihood

    - + - - - - + @@ -16822,7 +21291,7 @@

    Low Likelihood

    - + @@ -16833,7 +21302,7 @@

    Low Likelihood

    - @@ -16842,50 +21311,45 @@

    Low Likelihood

    -
    -

    Low Risk

    +
    +

    Monitor Control

    TermLowLikelihoodMonitorConsequence Prefix risk
    LabelLow LikelihoodMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is LowControl that monitors a Risk Consequence
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16896,11 +21360,11 @@

    Low Risk

    - + - + @@ -16912,7 +21376,7 @@

    Low Risk

    - + @@ -16923,7 +21387,7 @@

    Low Risk

    - @@ -16932,50 +21396,46 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Monitor Impact

    TermLowRiskMonitorControl Prefix risk
    LabelLow RiskMonitor Control
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Risk is LowRisk Mitigation Measure that uses controls to monitor events
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16986,12 +21446,9 @@

    Low Severity

    - + - - - - + @@ -17002,7 +21459,7 @@

    Low Severity

    - + @@ -17013,7 +21470,7 @@

    Low Severity

    - @@ -17022,43 +21479,48 @@

    Low Severity

    - - - -
    -

    Malicious Activity

    +
    +

    Monitor Risk

    TermLowSeverityMonitorImpact Prefix risk
    LabelLow SeverityMonitor Impact
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Severity is LowControl that monitors a Risk Impact
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17067,7 +21529,7 @@

    Malicious Activity

    - + @@ -17078,14 +21540,20 @@

    Malicious Activity

    - + + + + - + + + + - @@ -17094,46 +21562,48 @@

    Malicious Activity

    - - - - - -
    -

    Malicious Code Attack

    +
    +

    Monitor Control

    TermMaliciousActivityMonitorRisk Prefix risk
    LabelMalicious ActivityMonitor Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousActivityhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to othersControl that monitors a Risk
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17142,28 +21612,22 @@

    Malicious Code Attack

    - + - - - - + - + - - - - + @@ -17172,7 +21636,7 @@

    Malicious Code Attack

    - @@ -17181,46 +21645,48 @@

    Malicious Code Attack

    - - - - - -
    -

    Malware Attack

    +
    +

    Monitor Risk Source

    TermMaliciousCodeAttackMonitorRiskControl Prefix risk
    LabelMalicious Code AttackMonitor Control
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors another Control
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17229,28 +21695,22 @@

    Malware Attack

    - + - - - - + - + - - - - + @@ -17259,7 +21719,7 @@

    Malware Attack

    - @@ -17268,43 +21728,48 @@

    Malware Attack

    - - - -
    -

    Material Damage

    +
    +

    Monitor Vulnerabilities

    TermMalwareAttackMonitorRiskSource Prefix risk
    LabelMalware AttackMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk Source
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17313,12 +21778,9 @@

    Material Damage

    - + - - - - + @@ -17329,12 +21791,9 @@

    Material Damage

    - + - - - - + @@ -17343,7 +21802,7 @@

    Material Damage

    - @@ -17355,23 +21814,23 @@

    Material Damage

    -
    -

    Misandry

    +
    +

    Nationality Discrimination

    TermMaterialDamageMonitorVulnerabilities Prefix risk
    LabelMaterial DamageMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that monitors a Risk Vulnerability
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -17383,14 +21842,8 @@

    Misandry

    - - - @@ -17404,7 +21857,7 @@

    Misandry

    - + @@ -17437,42 +21890,36 @@

    Misandry

    -
    -

    Misogyny

    +
    +

    Non-Material Damage

    TermMisandryNationalityDiscrimination Prefix risk
    LabelMisandryNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#Misandryhttps://w3id.org/dpv/risk#NationalityDiscrimination
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against menDiscrimination based on a person's nationality or citizenship
    - + - + - + - + - - - @@ -17486,9 +21933,12 @@

    Misogyny

    - + - + + + + @@ -17499,10 +21949,16 @@

    Misogyny

    - + - - + + + + + + + + @@ -17519,35 +21975,38 @@

    Misogyny

    -
    -

    Misuse

    +
    +

    Non-Normality Bias

    TermMisogynyNonMaterialDamage Prefix risk
    LabelMisogynyNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Misogynyhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against womenConcept representing Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-09-302022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -17561,28 +22020,28 @@

    Misuse

    - + - + + + + - + - - - - + - + @@ -17597,52 +22056,47 @@

    Misuse

    -
    -

    Moderate Likelihood

    + + + +
    +

    Non-Response Bias

    TermMisuseNonNormalityBias Prefix risk
    LabelMisuseNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:UserRisks + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes MisuseBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-06-112024-09-13
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -17651,34 +22105,34 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + - @@ -17687,52 +22141,42 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + +
    +

    Operational Security Risk

    TermModerateLikelihoodNonResponseBias Prefix risk
    LabelModerate LikelihoodNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17741,12 +22185,9 @@

    Moderate Risk

    - + - - - - + @@ -17755,20 +22196,14 @@

    Moderate Risk

    - - - - + - - - - + - @@ -17777,52 +22212,43 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + + +
    +

    Organisational Risk Concept

    TermModerateRiskOperationalSecurityRisk Prefix risk
    LabelModerate RiskOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateRisks and issues that arise during operational processes
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17831,11 +22257,11 @@

    Moderate Severity

    - + - + @@ -17847,18 +22273,15 @@

    Moderate Severity

    - + - - - - + - @@ -17867,48 +22290,45 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    + + + +
    +

    Out-Group Homogeneity Bias

    TermModerateSeverityOrganisationalRiskConcept Prefix risk
    LabelModerate SeverityOrganisational Risk Concept
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#OrganisationalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateRisk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Organisational in this context refers to an organisation which is not human but is managed by humans
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17917,31 +22337,34 @@

    Monitor Consequence

    - + - + + + + - + - + - @@ -17950,47 +22373,45 @@

    Monitor Consequence

    -
    -

    Monitor Control

    + + + +
    +

    Payment

    TermMonitorConsequenceOutGroupHomogeneityBias Prefix risk
    LabelMonitor ConsequenceOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ConsequenceBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17999,12 +22420,9 @@

    Monitor Control

    - + - - - - + @@ -18015,18 +22433,21 @@

    Monitor Control

    - + - + + + + - + - @@ -18035,48 +22456,44 @@

    Monitor Control

    -
    -

    Monitor Impact

    + + + +
    +

    Personalisation Disabled

    TermMonitorControlPayment Prefix risk
    LabelMonitor ControlPayment
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsSomething that acts as or provides payment e.g. to access a service or purchase resources
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18085,7 +22502,7 @@

    Monitor Impact

    - + @@ -18098,18 +22515,15 @@

    Monitor Impact

    - + - - - - + - @@ -18118,48 +22532,44 @@

    Monitor Impact

    -
    -

    Monitor Risk

    + + + +
    +

    Personalisation Enabled

    TermMonitorImpactPersonalisationDisabled Prefix risk
    LabelMonitor ImpactPersonalisation Disabled
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#PersonalisationDisabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18168,7 +22578,7 @@

    Monitor Risk

    - + @@ -18181,18 +22591,15 @@

    Monitor Risk

    - + - - - - + - @@ -18201,48 +22608,44 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Personal Safety Endangerment

    TermMonitorRiskPersonalisationEnabled Prefix risk
    LabelMonitor RiskPersonalisation Enabled
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#PersonalisationEnabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18251,22 +22654,28 @@

    Monitor Control

    - + - + + + + - + - + + + + @@ -18275,7 +22684,7 @@

    Monitor Control

    - @@ -18284,48 +22693,46 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + + +
    +

    Phishing Scam

    TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
    LabelMonitor ControlPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlConcept representing Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18334,22 +22741,28 @@

    Monitor Risk Source

    - + - + + + + - + - + + + + @@ -18358,7 +22771,7 @@

    Monitor Risk Source

    - @@ -18367,48 +22780,45 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Physical Assault

    TermMonitorRiskSourcePhishingScam Prefix risk
    LabelMonitor Risk SourcePhishing Scam
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceConcept representing Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18417,22 +22827,28 @@

    Monitor Vulnerabilities

    - + - + + + + - + - + + + + @@ -18441,7 +22857,7 @@

    Monitor Vulnerabilities

    - @@ -18453,40 +22869,37 @@

    Monitor Vulnerabilities

    -
    -

    Nationality Discrimination

    +
    +

    Physical Harm

    TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
    LabelMonitor VulnerabilitiesPhysical Assault
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityConcept representing Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -18498,10 +22911,7 @@

    Nationality Discrimination

    - - - - + @@ -18511,10 +22921,7 @@

    Nationality Discrimination

    - - - - + @@ -18532,36 +22939,35 @@

    Nationality Discrimination

    - -
    -

    Non-Material Damage

    +
    +

    Policy Risk

    TermNationalityDiscriminationPhysicalHarm Prefix risk
    LabelNationality DiscriminationPhysical Harm
    IRIhttps://w3id.org/dpv/risk#NationalityDiscriminationhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's nationality or citizenship
    Date Created2024-09-30
    - + - + - + - + - @@ -18575,12 +22981,9 @@

    Non-Material Damage

    - + - - - - + @@ -18589,18 +22992,9 @@

    Non-Material Damage

    - - - - - - - - - - - - + + + @@ -18613,42 +23007,35 @@

    Non-Material Damage

    - - - - -
    -

    Non-Normality Bias

    +
    +

    Potential Consequence

    TermNonMaterialDamagePolicyRisk Prefix risk
    LabelNon-Material DamagePolicy Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PolicyRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:LegalRisk + risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageRisks and consequences regarding policy and its associated processes
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -18661,34 +23048,34 @@

    Non-Normality Bias

    - + - + + + + - - - - + - + - + - @@ -18696,43 +23083,35 @@

    Non-Normality Bias

    - - - - -
    -

    Non-Response Bias

    +
    +

    Potential Impact

    TermNonNormalityBiasPotentialConsequence Prefix risk
    LabelNon-Normality BiasPotential Consequence
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18745,34 +23124,34 @@

    Non-Response Bias

    - + - + + + + - - - - + - + - + - @@ -18780,33 +23159,30 @@

    Non-Response Bias

    - - - -
    -

    Operational Security Risk

    +
    +

    Potential Risk

    TermNonResponseBiasPotentialImpact Prefix risk
    LabelNon-Response BiasPotential Impact
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + @@ -18824,9 +23200,12 @@

    Operational Security Risk

    - + - + + + + @@ -18835,14 +23214,20 @@

    Operational Security Risk

    - + + + + - + + + + - @@ -18850,41 +23235,35 @@

    Operational Security Risk

    - - - - -
    -

    Out-Group Homogeneity Bias

    +
    +

    Potential RiskSource

    TermOperationalSecurityRiskPotentialRisk Prefix risk
    LabelOperational Security RiskPotential Risk
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    DefinitionRisks and issues that arise during operational processesIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18897,34 +23276,34 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - + - + - @@ -18936,23 +23315,23 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    +
    +

    Privacy

    TermOutGroupHomogeneityBiasPotentialRiskSource Prefix risk
    LabelOut-Group Homogeneity BiasPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + @@ -18964,8 +23343,8 @@

    Payment

    - @@ -18977,10 +23356,7 @@

    Payment

    - - - - + @@ -18990,18 +23366,9 @@

    Payment

    - - - - - - - - - - - - + + + @@ -19018,23 +23385,23 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Psychological Harm

    TermPaymentPrivacy Prefix risk
    LabelPaymentPrivacy
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#Privacy
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + @@ -19046,7 +23413,9 @@

    Personal Safety Endangerment

    - @@ -19060,7 +23429,7 @@

    Personal Safety Endangerment

    - + @@ -19069,7 +23438,7 @@

    Personal Safety Endangerment

    - + @@ -19101,38 +23470,36 @@

    Personal Safety Endangerment

    - - -
    -

    Phishing Scam

    +
    +

    Public Order Breach

    TermPersonalSafetyEndangermentPsychologicalHarm Prefix risk
    LabelPersonal Safety EndangermentPsychological Harm
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PsychologicalHarm
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Personal Safety EndangermentConcept representing Psychological Harm
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - @@ -19146,7 +23513,7 @@

    Phishing Scam

    - + @@ -19155,7 +23522,7 @@

    Phishing Scam

    - + @@ -19188,23 +23555,23 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Public Services Exclusion

    TermPhishingScamPublicOrderBreach Prefix risk
    LabelPhishing ScamPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamConcept representing Public Order Breach
    SourceENISA Threat Landscape for Ransomware Attacks 2022ISO/IEC 27005:2018
    - + - + - + @@ -19216,8 +23583,9 @@

    Physical Assault

    - @@ -19230,32 +23598,23 @@

    Physical Assault

    - + - - - - + - + - - - - - - - - + + @@ -19272,36 +23631,38 @@

    Physical Assault

    -
    -

    Physical Harm

    +
    +

    Racial Discrimination

    TermPhysicalAssaultPublicServicesExclusion Prefix risk
    LabelPhysical AssaultPublic Services Exclusion
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#PublicServicesExclusion
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -19312,7 +23673,10 @@

    Physical Harm

    - + + + + @@ -19322,7 +23686,10 @@

    Physical Harm

    - + + + + @@ -19337,35 +23704,41 @@

    Physical Harm

    -
    -

    Potential Consequence

    + + + + +
    +

    Racism

    TermPhysicalHarmRacialDiscrimination Prefix risk
    LabelPhysical HarmRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionDiscrimination against individuals because of their racial background or skin color
    Date Created2024-09-30
    - + - + - + - + - @@ -19378,12 +23751,9 @@

    Potential Consequence

    - + - - - - + @@ -19394,18 +23764,15 @@

    Potential Consequence

    - + - - - - + - @@ -19413,39 +23780,48 @@

    Potential Consequence

    -
    -

    Potential Impact

    + +
    +

    Recovery Control

    TermPotentialConsequenceRacism Prefix risk
    LabelPotential ConsequenceRacism
    IRIhttps://w3id.org/dpv/risk#PotentialConsequencehttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept can potentially be a 'consequence concept within an use-casePrejudice or discrimination against people based on their race
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -19454,12 +23830,9 @@

    Potential Impact

    - + - - - - + @@ -19470,18 +23843,15 @@

    Potential Impact

    - + - - - - + - @@ -19489,39 +23859,49 @@

    Potential Impact

    -
    -

    Potential Risk

    + +
    +

    Reduce Likelihood

    TermPotentialImpactRecoveryControl Prefix risk
    LabelPotential ImpactRecovery Control
    IRIhttps://w3id.org/dpv/risk#PotentialImpacthttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'impact' concept within an use-caseControl to recover from event
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19530,12 +23910,9 @@

    Potential Risk

    - + - - - - + @@ -19546,7 +23923,7 @@

    Potential Risk

    - + @@ -19557,7 +23934,7 @@

    Potential Risk

    - @@ -19565,39 +23942,49 @@

    Potential Risk

    -
    -

    Potential RiskSource

    + +
    +

    Reduce Severity

    TermPotentialRiskReduceLikelihood Prefix risk
    LabelPotential RiskReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#PotentialRiskhttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk' concept within an use-caseControl that reduces the likelihood of an event
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19606,12 +23993,9 @@

    Potential RiskSource

    - + - - - - + @@ -19622,7 +24006,7 @@

    Potential RiskSource

    - + @@ -19633,7 +24017,7 @@

    Potential RiskSource

    - @@ -19642,49 +24026,57 @@

    Potential RiskSource

    - - - -
    -

    Privacy

    +
    +

    Reduction Control

    TermPotentialRiskSourceReduceSeverity Prefix risk
    LabelPotential RiskSourceReduce Severity
    IRIhttps://w3id.org/dpv/risk#PotentialRiskSourcehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk source' concept within an use-caseControl that reduces the severity of an event
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -19694,14 +24086,17 @@

    Privacy

    - + + + + - @@ -19713,36 +24108,40 @@

    Privacy

    -
    -

    Psychological Harm

    + + + +
    +

    Re-identification

    TermPrivacyReductionControl Prefix risk
    LabelPrivacyReduction Control
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that reduces the likelihood or severity of an event
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -19755,23 +24154,23 @@

    Psychological Harm

    - + - + + + + - - - - + - + @@ -19796,35 +24195,37 @@

    Psychological Harm

    -
    -

    Public Order Breach

    + +
    +

    Religious Discrimination

    TermPsychologicalHarmReidentification Prefix risk
    LabelPsychological HarmRe-identification
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Psychological HarmConcept representing Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-19
    Date Modified
    - + - + - + - + - @@ -19838,32 +24239,23 @@

    Public Order Breach

    - + - - - - + - + - - - - - - - - + + @@ -19877,50 +24269,47 @@

    Public Order Breach

    - - - -
    -

    Racial Discrimination

    +
    +

    Remedy Control

    TermPublicOrderBreachReligiousDiscrimination Prefix risk
    LabelPublic Order BreachReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Public Order BreachDiscrimination based on a person's religious beliefs or practices
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -19929,7 +24318,7 @@

    Racial Discrimination

    - + @@ -19942,7 +24331,7 @@

    Racial Discrimination

    - + @@ -19950,7 +24339,7 @@

    Racial Discrimination

    - @@ -19959,48 +24348,48 @@

    Racial Discrimination

    - - - -
    -

    Racism

    +
    +

    Remove Consequence

    TermRacialDiscriminationRemedyControl Prefix risk
    LabelRacial DiscriminationRemedy Control
    IRIhttps://w3id.org/dpv/risk#RacialDiscriminationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals because of their racial background or skin colorControl to remedy consequences of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - + + + + @@ -20009,7 +24398,7 @@

    Racism

    - + @@ -20022,15 +24411,18 @@

    Racism

    - + - + + + + - @@ -20039,23 +24431,23 @@

    Racism

    -
    -

    Recovery Control

    +
    +

    Remove Impact

    TermRacismRemoveConsequence Prefix risk
    LabelRacismRemove Consequence
    IRIhttps://w3id.org/dpv/risk#Racismhttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionPrejudice or discrimination against people based on their raceControl that removes Consequence i.e. prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -20067,7 +24459,8 @@

    Recovery Control

    - @@ -20077,7 +24470,7 @@

    Recovery Control

    @@ -20088,7 +24481,7 @@

    Recovery Control

    - + @@ -20104,7 +24497,10 @@

    Recovery Control

    - + + + + @@ -20118,23 +24514,23 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Remove Source

    TermRecoveryControlRemoveImpact Prefix risk
    LabelRecovery ControlRemove Impact
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:RiskControl + risk:ImpactControl + → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl to recover from eventControl that removes Impact i.e. prevents it from materialising
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -20146,7 +24542,7 @@

    Reduce Likelihood

    - @@ -20168,7 +24564,7 @@

    Reduce Likelihood

    - + @@ -20201,48 +24597,44 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    + + + +
    +

    Remuneration

    TermReduceLikelihoodRemoveSource Prefix risk
    LabelReduce LikelihoodRemove Source
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:ReductionControl + risk:SourceControl → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure @@ -20157,7 +24553,7 @@

    Reduce Likelihood

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl that reduces the likelihood of an eventControl that removes the risk source
    - + - + - + - + - - - - - + @@ -20251,7 +24643,7 @@

    Reduce Severity

    - + @@ -20264,18 +24656,21 @@

    Reduce Severity

    - + - + + + + - + - @@ -20284,47 +24679,43 @@

    Reduce Severity

    -
    -

    Reduction Control

    + + + +
    +

    Reputational Risk

    TermReduceSeverityRenumeration Prefix risk
    LabelReduce SeverityRemuneration
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20333,7 +24724,7 @@

    Reduction Control

    - + @@ -20344,17 +24735,14 @@

    Reduction Control

    - - - - + - @@ -20366,38 +24754,37 @@

    Reduction Control

    - - - -
    -

    Re-identification

    +
    +

    Requirements Bias

    TermReductionControlReputationalRisk Prefix risk
    LabelReduction ControlReputational Risk
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -20411,31 +24798,31 @@

    Re-identification

    - + - + - + + + + - + - - - - + - + @@ -20453,23 +24840,23 @@

    Re-identification

    -
    -

    Religious Discrimination

    +
    +

    Reverse Discrimination

    TermReidentificationRequirementsBias Prefix risk
    LabelRe-identificationRequirements Bias
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Re-identificationBias that occurs in or during requirements creation
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentificationRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2022-08-192024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + @@ -20482,11 +24869,7 @@

    Religious Discrimination

    - - @@ -20500,7 +24883,7 @@

    Religious Discrimination

    - + @@ -20530,47 +24913,45 @@

    Religious Discrimination

    -
    -

    Remedy Control

    + + + +
    +

    Reward

    TermReligiousDiscriminationReverseDiscrimination Prefix risk
    LabelReligious DiscriminationReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#ReligiousDiscriminationhttps://w3id.org/dpv/risk#ReverseDiscrimination
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's religious beliefs or practicesDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    - + - + - + - + - - - - - + @@ -20579,7 +24960,7 @@

    Remedy Control

    - + @@ -20592,15 +24973,21 @@

    Remedy Control

    - + - - + + + + + + + + - @@ -20609,48 +24996,44 @@

    Remedy Control

    -
    -

    Remove Consequence

    + + + +
    +

    Rights Denied

    TermRemedyControlReward Prefix risk
    LabelRemedy ControlReward
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to remedy consequences of eventSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20659,31 +25042,104 @@

    Remove Consequence

    - + + + + + + + + + + + + + + + + + + + + +
    TermRemoveConsequenceRightsDenied Prefix risk
    LabelRemove ConsequenceRights Denied
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RightsDenied
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Rights Eroded

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - + + - - - - + + + + + + + + + + + + + + - @@ -20692,48 +25148,44 @@

    Remove Consequence

    -
    -

    Remove Impact

    + + + +
    +

    Rights Exercise Prevented

    TermRightsErodedPrefixrisk
    LabelRights Eroded
    IRIhttps://w3id.org/dpv/risk#RightsEroded
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    Date Created2024-05-19DefinitionThe gradual weakening or reduction of the scope and protection of rights
    ContributorsHarshvardhan J. Pandit
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20742,9 +25194,12 @@

    Remove Impact

    - + - + + + + @@ -20755,18 +25210,21 @@

    Remove Impact

    - + - + + + + - + - @@ -20775,48 +25233,43 @@

    Remove Impact

    -
    -

    Remove Source

    + + + +
    +

    Rights Impact

    TermRemoveImpactRightsExercisePrevented Prefix risk
    LabelRemove ImpactRights Exercise Prevented
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevented
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-192022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20825,22 +25278,31 @@

    Remove Source

    - + - + + + + - + + + + - + - + + + + @@ -20849,7 +25311,7 @@

    Remove Source

    - @@ -20861,23 +25323,23 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Rights Limited

    TermRemoveSourceRightsImpact Prefix risk
    LabelRemove SourceRights Impact
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceConcept representing Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -20889,7 +25351,8 @@

    Remuneration

    - @@ -20903,9 +25366,12 @@

    Remuneration

    - + - + + + + @@ -20916,7 +25382,7 @@

    Remuneration

    - + @@ -20942,23 +25408,23 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Rights Obstructed

    TermRenumerationRightsLimited Prefix risk
    LabelRemunerationRights Limited
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimited
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    - + - + - + @@ -20970,7 +25436,9 @@

    Reputational Risk

    - @@ -20983,9 +25451,12 @@

    Reputational Risk

    - + - + + + + @@ -21013,37 +25484,37 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    Rights Unfulfilled

    TermReputationalRiskRightsObstructed Prefix risk
    LabelReputational RiskRights Obstructed
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsObstructed
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that affect the reputation of the organisationInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    - + - + - + - + - @@ -21056,32 +25527,23 @@

    Requirements Bias

    - + - + - - - - + - - - - + - - - - + @@ -21098,40 +25560,36 @@

    Requirements Bias

    -
    -

    Reverse Discrimination

    +
    +

    Rights Violated

    TermRequirementsBiasRightsUnfulfilled Prefix risk
    LabelRequirements BiasRights Unfulfilled
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs in or during requirements creationFailure to meet or complete the fulfilment of rights
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifestHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -21145,9 +25603,12 @@

    Reverse Discrimination

    - + - + + + + @@ -21158,10 +25619,16 @@

    Reverse Discrimination

    - + - - + + + + + + + + @@ -21172,43 +25639,42 @@

    Reverse Discrimination

    TermReverseDiscriminationRightsViolated Prefix risk
    LabelReverse DiscriminationRights Violated
    IRIhttps://w3id.org/dpv/risk#ReverseDiscriminationhttps://w3id.org/dpv/risk#RightsViolated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equalityThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-09-302022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    + + + + - - - - -
    -

    Reward

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -21221,34 +25687,34 @@

    Reward

    - + - + + + + - + - - - - + - + - @@ -21256,41 +25722,35 @@

    Reward

    - - - - -
    -

    Erosion of Rights

    +
    +

    Risk Assessment

    TermRewardRiskAnalysis Prefix risk
    LabelRewardRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2024-04-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21303,28 +25763,31 @@

    Erosion of Rights

    - + - - - - + - + + + + - + + + + - @@ -21332,45 +25795,46 @@

    Erosion of Rights

    - - - - -
    -

    Obstruction of Rights

    +
    +

    Risk Control

    TermRightErodedRiskAssessment Prefix risk
    LabelErosion of RightsRisk Assessment
    IRIhttps://w3id.org/dpv/risk#RightErodedhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
    DefinitionThe gradual weakening or reduction of the scope and protection of rightsAssessment of risk involving its identification, analysis, and evaluation
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-02-14
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -21379,13 +25843,13 @@

    Obstruction of Rights

    - + - - - - + + + + @@ -21393,14 +25857,17 @@

    Obstruction of Rights

    - + + + + - @@ -21408,42 +25875,33 @@

    Obstruction of Rights

    - - - - -
    -

    Denial of Rights

    +
    +

    Risk Management

    TermRightObstructedRiskControl Prefix risk
    LabelObstruction of RightsRisk Control
    IRIhttps://w3id.org/dpv/risk#RightObstructedhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionInterference with or blocking of the exercise of rightsControl that modifies risk
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + @@ -21455,28 +25913,31 @@

    Denial of Rights

    - + - - - - + - + + + + - + + + + - @@ -21485,40 +25946,36 @@

    Denial of Rights

    - - - -
    -

    Prevent Exercising of Rights

    +
    +

    Risk Matrix

    TermRightsDenialRiskManagement Prefix risk
    LabelDenial of RightsRisk Management
    IRIhttps://w3id.org/dpv/risk#RightsDenialhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept -
    DefinitionThe refusal or withholding or denial of the existence or applicability of rightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-06-12
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21531,37 +25988,34 @@

    Prevent Exercising of Rights

    - + - - - - + - + + + + - + - - - - + - + - @@ -21570,39 +26024,37 @@

    Prevent Exercising of Rights

    - - - -
    -

    Impact to Rights

    +
    +

    Risk Matrix 3x3

    TermRightsExercisePreventionRiskMatrix Prefix risk
    LabelPrevent Exercising of RightsRisk Matrix
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionActions or measures that prevent an individual or group from exercising their legal rights.Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceIEC 31010:2019
    Date Created2022-08-182024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21615,20 +26067,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -21636,10 +26082,7 @@

    Impact to Rights

    - - - - + @@ -21648,7 +26091,7 @@

    Impact to Rights

    - @@ -21657,40 +26100,37 @@

    Impact to Rights

    - - - -
    -

    Limitation of Rights

    +
    +

    Risk Matrix 5x5

    TermRightsImpactRiskMatrix3x3 Prefix risk
    LabelImpact to RightsRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Impact to RightsA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21703,12 +26143,9 @@

    Limitation of Rights

    - + - - - - + @@ -21719,21 +26156,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -21742,40 +26176,37 @@

    Limitation of Rights

    - - - -
    -

    Unfulfilment of Rights

    +
    +

    Risk Matrix 7x7

    TermRightsLimitationRiskMatrix5x5 Prefix risk
    LabelLimitation of RightsRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionA limitation or restrictions on the scope or exercise of rightsA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21788,12 +26219,9 @@

    Unfulfilment of Rights

    - + - - - - + @@ -21802,14 +26230,20 @@

    Unfulfilment of Rights

    - + + + + - + + + + - @@ -21817,45 +26251,43 @@

    Unfulfilment of Rights

    - - - - -
    -

    Violation of Rights

    +
    +

    Risk Source

    TermRightsUnfulfilledRiskMatrix7x7 Prefix risk
    LabelUnfulfilment of RightsRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RightsUnfulfilledhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionFailure to meet or complete the fulfilment of rightsA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - + + + + @@ -21864,12 +26296,9 @@

    Violation of Rights

    - + - - - - + @@ -21880,61 +26309,57 @@

    Violation of Rights

    - + - - - - + -
    TermRightsViolationRiskSource Prefix risk
    LabelViolation of RightsRisk Source
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rightsThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182024-02-14
    Date Modified 2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + - + - + - @@ -21948,23 +26373,20 @@

    Risk Analysis

    - + - - - - + - + @@ -21975,7 +26397,7 @@

    Risk Analysis

    - @@ -21983,35 +26405,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRiskAnalysisRM3x3S1L1 Prefix risk
    LabelRisk AnalysisLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22024,31 +26450,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -22056,46 +26482,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRiskAssessmentRM3x3S1L2 Prefix risk
    LabelRisk AssessmentLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -22104,13 +26527,10 @@

    Risk Control

    - + - - - @@ -22120,15 +26540,18 @@

    Risk Control

    - + - + + + + - @@ -22136,33 +26559,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRiskControlRM3x3S1L3 Prefix risk
    LabelRisk ControlModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -22174,31 +26604,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -22207,35 +26637,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRiskManagementRM3x3S2L1 Prefix risk
    LabelRisk ManagementLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22249,23 +26681,20 @@

    Risk Matrix

    - + - - - - + - + @@ -22276,7 +26705,7 @@

    Risk Matrix

    - @@ -22285,23 +26714,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRiskMatrixRM3x3S2L2 Prefix risk
    LabelRisk MatrixModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22313,7 +26742,8 @@

    Risk Matrix 3x3

    - @@ -22328,7 +26758,7 @@

    Risk Matrix 3x3

    - + @@ -22361,23 +26791,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRiskMatrix3x3RM3x3S2L3 Prefix risk
    LabelRisk Matrix 3x3High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22389,7 +26819,8 @@

    Risk Matrix 5x5

    - @@ -22404,7 +26835,7 @@

    Risk Matrix 5x5

    - + @@ -22437,23 +26868,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRiskMatrix5x5RM3x3S3L1 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22465,7 +26896,8 @@

    Risk Matrix 7x7

    - @@ -22480,7 +26912,7 @@

    Risk Matrix 7x7

    - + @@ -22512,43 +26944,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRiskMatrix7x7RM3x3S3L2 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + - + - - - - - + @@ -22557,7 +26989,7 @@

    Risk Source

    - + @@ -22570,18 +27002,18 @@

    Risk Source

    - + + - - - - + + + - @@ -22590,23 +27022,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRiskSourceRM3x3S3L3 Prefix risk
    LabelRisk SourceHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22618,7 +27050,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -22667,23 +27099,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM3x3S1L1RM5x5S1L1 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S1L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22634,7 +27066,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22695,7 +27127,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -22744,23 +27176,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM3x3S1L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S1L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22711,7 +27143,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22772,7 +27204,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -22821,23 +27253,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM3x3S1L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S1L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22788,7 +27220,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22849,7 +27281,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -22898,23 +27330,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM3x3S2L1RM5x5S1L4 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S1L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22865,7 +27297,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22926,7 +27358,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -22975,23 +27407,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM3x3S2L2RM5x5S1L5 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22942,7 +27374,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -23003,7 +27435,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -23052,23 +27484,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM3x3S2L3RM5x5S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S2L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23019,7 +27451,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23080,7 +27512,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -23129,23 +27561,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM3x3S3L1RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S2L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23096,7 +27528,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -23157,7 +27589,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -23206,23 +27638,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM3x3S3L2RM5x5S2L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23173,7 +27605,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23234,7 +27666,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -23283,23 +27715,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM3x3S3L3RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23250,7 +27682,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -23327,7 +27759,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -23360,23 +27792,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S1L1RM5x5S2L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -23404,7 +27836,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -23437,23 +27869,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S1L2RM5x5S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23481,7 +27913,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -23514,23 +27946,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S1L3RM5x5S3L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23558,7 +27990,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -23591,23 +28023,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S1L4RM5x5S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23635,7 +28067,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -23668,23 +28100,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S1L5RM5x5S3L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23712,7 +28144,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -23745,23 +28177,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S2L1RM5x5S3L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23789,7 +28221,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -23822,23 +28254,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S2L2RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23866,7 +28298,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -23899,23 +28331,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S2L3RM5x5S4L2 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23943,7 +28375,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -23976,23 +28408,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S2L4RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24020,7 +28452,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -24053,23 +28485,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S2L5RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24097,7 +28529,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -24130,23 +28562,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S3L1RM5x5S4L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24174,7 +28606,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -24207,23 +28639,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S3L2RM5x5S5L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -24251,7 +28683,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -24284,23 +28716,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S3L3RM5x5S5L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -24328,7 +28760,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -24361,23 +28793,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S3L4RM5x5S5L3 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24405,7 +28837,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -24438,23 +28870,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S3L5RM5x5S5L4 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24482,7 +28914,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -24515,23 +28947,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S4L1RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24543,7 +28975,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -24592,23 +29024,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S4L2RM7x7S1L1 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24559,7 +28991,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24620,7 +29052,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -24669,23 +29101,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S4L3RM7x7S1L2 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24636,7 +29068,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24697,7 +29129,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -24746,23 +29178,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S4L4RM7x7S1L3 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24713,7 +29145,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24774,7 +29206,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -24823,23 +29255,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S4L5RM7x7S1L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24790,7 +29222,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24851,7 +29283,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermRM5x5S5L1RM7x7S1L5 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24867,7 +29299,84 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK +
    +
    + + + +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -24900,23 +29409,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S1L6Prefixrisk
    LabelVery Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6
    Typerdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24928,7 +29437,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -24977,23 +29486,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S5L2RM7x7S1L7 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24944,7 +29453,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -25005,7 +29514,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -25054,23 +29563,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S5L3RM7x7S2L1 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25021,7 +29530,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25082,7 +29591,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -25131,23 +29640,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S5L4RM7x7S2L2 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25098,7 +29607,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -25159,7 +29668,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -25208,23 +29717,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S5L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25175,7 +29684,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -25252,7 +29761,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -25285,23 +29794,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S1L1RM7x7S2L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -25329,7 +29838,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -25362,23 +29871,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S1L2RM7x7S2L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -25406,7 +29915,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -25439,23 +29948,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S1L3RM7x7S2L6 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -25483,7 +29992,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -25516,23 +30025,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S1L4RM7x7S2L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25560,7 +30069,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -25593,23 +30102,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S1L5RM7x7S3L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25637,7 +30146,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -25670,23 +30179,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S1L6RM7x7S3L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25714,7 +30223,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -25747,23 +30256,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S1L7RM7x7S3L3 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25791,7 +30300,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -25824,23 +30333,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S2L1RM7x7S3L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25868,7 +30377,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -25901,23 +30410,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S2L2RM7x7S3L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25945,7 +30454,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -25978,23 +30487,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S2L3RM7x7S3L6 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -26022,7 +30531,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -26055,23 +30564,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S2L4RM7x7S3L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26099,7 +30608,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -26132,23 +30641,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S2L5RM7x7S4L1 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -26176,7 +30685,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -26209,23 +30718,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S2L6RM7x7S4L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26253,7 +30762,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -26286,23 +30795,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S2L7RM7x7S4L3 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26330,7 +30839,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -26363,23 +30872,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S3L1RM7x7S4L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26407,7 +30916,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -26440,23 +30949,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S3L2RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -26484,7 +30993,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -26517,23 +31026,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S3L3RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26561,7 +31070,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -26594,23 +31103,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S3L4RM7x7S4L7 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26638,7 +31147,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -26671,23 +31180,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S3L5RM7x7S5L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26715,7 +31224,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -26748,23 +31257,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S3L6RM7x7S5L2 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26792,7 +31301,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -26825,23 +31334,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S3L7RM7x7S5L3 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26869,7 +31378,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -26902,23 +31411,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S4L1RM7x7S5L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26946,7 +31455,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -26979,23 +31488,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S4L2RM7x7S5L5 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27023,7 +31532,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -27056,23 +31565,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S4L3RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27100,7 +31609,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -27133,23 +31642,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S4L4RM7x7S5L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27177,7 +31686,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -27210,23 +31719,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S4L5RM7x7S6L1 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -27254,7 +31763,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -27287,23 +31796,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S4L6RM7x7S6L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27331,7 +31840,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -27364,23 +31873,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S4L7RM7x7S6L3 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27408,7 +31917,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -27441,23 +31950,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S5L1RM7x7S6L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -27485,7 +31994,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -27518,23 +32027,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S5L2RM7x7S6L5 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27562,7 +32071,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -27595,23 +32104,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S5L3RM7x7S6L6 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27639,7 +32148,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -27672,23 +32181,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S5L4RM7x7S6L7 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27716,7 +32225,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -27749,23 +32258,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S5L5RM7x7S7L1 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27793,7 +32302,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -27826,23 +32335,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S5L6RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27870,7 +32379,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -27903,23 +32412,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S5L7RM7x7S7L3 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27947,7 +32456,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -27980,23 +32489,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S6L1RM7x7S7L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -28024,7 +32533,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -28057,23 +32566,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S6L2RM7x7S7L5 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -28101,7 +32610,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -28134,23 +32643,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S6L3RM7x7S7L6 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -28178,7 +32687,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -28211,38 +32720,41 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S6L4RM7x7S7L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -28255,31 +32767,37 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - + + + + - + + + + - + - + - @@ -28288,38 +32806,43 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + + + +
    +

    Sabotage

    TermRM7x7S6L5RuleBasedSystemDesign Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28332,14 +32855,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -28347,7 +32873,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -28356,7 +32885,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -28365,38 +32894,43 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    + + + +
    +

    Sampling Bias

    TermRM7x7S6L6Sabotage Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighConcept representing Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28409,31 +32943,34 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + - + + + + - + - + - @@ -28442,38 +32979,42 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + + +
    +

    Scam

    TermRM7x7S6L7SamplingBias Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28486,14 +33027,17 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + @@ -28501,7 +33045,10 @@

    Low Risk (RM7x7 S:7 L:1)

    - + + + + @@ -28510,7 +33057,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - @@ -28519,38 +33066,42 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + + + +
    +

    Security Attack

    TermRM7x7S7L1Scam Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowConcept representing Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28563,7 +33114,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -28574,20 +33125,14 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - - - - + - - - - + - @@ -28596,38 +33141,43 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S7L2SecurityAttack Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateConcept representing an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28640,14 +33190,17 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + @@ -28655,7 +33208,10 @@

    High Risk (RM7x7 S:7 L:3)

    - + + + + @@ -28664,7 +33220,7 @@

    High Risk (RM7x7 S:7 L:3)

    - @@ -28673,38 +33229,42 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Selection Bias

    TermRM7x7S7L3SecurityBreach Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighConcept representing Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28717,31 +33277,34 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + - + + + + - + - + - @@ -28750,38 +33313,45 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + + + + + + +
    +

    Service Alternative Offered

    TermRM7x7S7L4SelectionBias Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28794,7 +33364,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -28807,18 +33377,15 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - - - - + - @@ -28827,38 +33394,40 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    + + + +
    +

    Service Cost Increased

    TermRM7x7S7L5ServiceAlternativeOffered Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Service Alternative Offered
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#ServiceAlternativeOffered
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28871,7 +33440,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -28884,18 +33453,15 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - - - - + - @@ -28904,38 +33470,40 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + +
    +

    Service Denied

    TermRM7x7S7L6ServiceCostIncreased Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Service Cost Increased
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#ServiceCostIncreased
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28948,7 +33516,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -28961,18 +33529,15 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - - - - + - @@ -28984,37 +33549,37 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    +
    +

    Service Limited

    TermRM7x7S7L7ServiceDenied Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Service Denied
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#ServiceDenied
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -29027,32 +33592,23 @@

    Rule-Based System Design

    - + - - - - + - - - - + - + - - - - + @@ -29069,38 +33625,36 @@

    Rule-Based System Design

    - - -
    -

    Sabotage

    +
    +

    Service Not Provided

    TermRuleBasedSystemDesignServiceLimited Prefix risk
    LabelRule-Based System DesignService Limited
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#ServiceLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designStub
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29114,32 +33668,23 @@

    Sabotage

    - + - - - - + - + - - - - - - - - + + @@ -29156,39 +33701,37 @@

    Sabotage

    -
    -

    Sampling Bias

    +
    +

    Service Partially Provided

    TermSabotageServiceNotProvided Prefix risk
    LabelSabotageService Not Provided
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#ServiceNotProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SabotageStub
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29201,29 +33744,23 @@

    Sampling Bias

    - + - - - - + - + - - - - + @@ -29240,37 +33777,36 @@

    Sampling Bias

    - -
    -

    Scam

    +
    +

    Service Provided

    TermSamplingBiasServicePartiallyProvided Prefix risk
    LabelSampling BiasService Partially Provided
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#ServicePartiallyProvided
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29284,32 +33820,23 @@

    Scam

    - + - - - - + - + - - - - - - - - + + @@ -29326,37 +33853,36 @@

    Scam

    - - -
    -

    Security Attack

    +
    +

    Service Provision Delayed

    TermScamServiceProvided Prefix risk
    LabelScamService Provided
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#ServiceProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ScamStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29370,7 +33896,7 @@

    Security Attack

    - + @@ -29381,7 +33907,10 @@

    Security Attack

    - + + + + @@ -29400,38 +33929,111 @@

    Security Attack

    +
    +

    Service Quality Reduced

    +
    TermSecurityAttackServiceProvisionDelayed Prefix risk
    LabelSecurity AttackService Provision Delayed
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#ServiceProvisionDelayed
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itStub
    Date Created2024-10-21
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceQualityReducedPrefixrisk
    LabelService Quality Reduced
    IRIhttps://w3id.org/dpv/risk#ServiceQualityReduced
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    -
    -

    Security Breach

    + + + + +
    +

    None

    - + - + - + - + - @@ -29445,32 +34047,23 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + @@ -29487,38 +34080,37 @@

    Security Breach

    -
    -

    Selection Bias

    +
    +

    Service Security Reduced

    TermSecurityBreachServiceRelatedConsequence Prefix risk
    LabelSecurity BreachNone
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ServiceRelatedConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Security BreachA consequence related to the provision of a service
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29531,29 +34123,23 @@

    Selection Bias

    - + - - - - + - + - - - - + @@ -29570,6 +34156,77 @@

    Selection Bias

    +
    +

    Service Termination

    +
    TermSelectionBiasServiceSecurityReduced Prefix risk
    LabelSelection BiasService Security Reduced
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ServiceSecurityReduced
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceTerminationPrefixrisk
    LabelService Termination
    IRIhttps://w3id.org/dpv/risk#ServiceTermination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + @@ -29605,12 +34262,7 @@

    Sex Discrimination

    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29686,11 +34338,7 @@

    Sexism

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29767,6 +34415,8 @@

    Sexual Harassment

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29835,11 +34485,7 @@

    SexualOrientation Discrimination

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29916,6 +34562,8 @@

    Sexual Violence

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29928,7 +34576,7 @@

    Sexual Violence

    Definition - Something that acts as or causes Sexual Violence + Concept representing Sexual Violence @@ -30005,7 +34653,7 @@

    Share Risk

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl @@ -30082,7 +34730,8 @@

    Simpson'S Paradox Bias

    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30162,7 +34811,8 @@

    Social Disadvantage

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30176,7 +34826,7 @@

    Social Disadvantage

    Definition - Something that acts as or causes Social Disadvantage + Concept representing Social Disadvantage @@ -30245,7 +34895,8 @@

    Societal Bias

    Broader/Parent types risk:CognitiveBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30325,7 +34976,8 @@

    Societal Health & Safety

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30366,30 +35018,31 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + +
    +

    Societal Risk Concept

    - + - + - + - + @@ -30407,9 +35060,12 @@

    Societal Risk

    - + - + + + + @@ -30418,7 +35074,10 @@

    Societal Risk

    - + + + + @@ -30472,7 +35131,7 @@

    Source Control

    @@ -30551,6 +35210,7 @@

    Spoofing

    @@ -30564,7 +35224,7 @@

    Spoofing

    - + @@ -30636,7 +35296,8 @@

    Statistical Bias

    @@ -30718,6 +35379,7 @@

    System Failure

    @@ -30731,7 +35393,7 @@

    System Failure

    - + @@ -30777,37 +35439,124 @@

    System Failure

    - -
    -

    System Intrusion

    + +
    +

    System Intrusion

    +
    TermSocietalRiskSocietalRiskConcept Prefix risk
    LabelSocietal RiskSocietal Risk Concept
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#SocietalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societyRisk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process
    Usage NoteSocietal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure
    Date Created2024-10-21
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    Broader/Parent types risk:MaliciousActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingConcept representing Spoofing
    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureConcept representing System Failure
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermSystemIntrusionPrefixrisk
    LabelSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    System Malfunction

    - + - + - + - + - @@ -30821,16 +35570,19 @@

    System Intrusion

    - + - + + + + - + @@ -30864,36 +35616,35 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Technical Risk Concept

    TermSystemIntrusionSystemMalfunction Prefix risk
    LabelSystem IntrusionSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System IntrusionConcept representing System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - @@ -30906,35 +35657,26 @@

    System Malfunction

    - + - + - - - - + - + - - - - - - - - + + @@ -30979,7 +35721,8 @@

    Terrorism

    - @@ -30993,7 +35736,7 @@

    Terrorism

    - + @@ -31218,12 +35961,7 @@

    Transphobia

    - - @@ -31303,6 +36041,7 @@

    Unauthorised Access to Premises

    @@ -31316,7 +36055,7 @@

    Unauthorised Access to Premises

    - + @@ -31390,6 +36129,7 @@

    Unauthorised Activity

    @@ -31403,7 +36143,7 @@

    Unauthorised Activity

    - + @@ -31465,6 +36205,7 @@

    Unauthorised Code Access

    @@ -31478,7 +36219,7 @@

    Unauthorised Code Access

    - + @@ -31551,6 +36292,7 @@

    Unauthorised Code Disclosure

    @@ -31564,7 +36306,7 @@

    Unauthorised Code Disclosure

    - + @@ -31637,6 +36379,7 @@

    Unauthorised Code Modification

    @@ -31650,7 +36393,7 @@

    Unauthorised Code Modification

    - + @@ -31723,6 +36466,7 @@

    Unauthorised Data Access

    @@ -31736,7 +36480,7 @@

    Unauthorised Data Access

    - + @@ -31809,6 +36553,7 @@

    Unauthorised Data Disclosure

    @@ -31822,7 +36567,7 @@

    Unauthorised Data Disclosure

    - + @@ -31895,6 +36640,7 @@

    Unauthorised Data Modification

    @@ -31908,7 +36654,7 @@

    Unauthorised Data Modification

    - + @@ -31981,6 +36727,7 @@

    Unauthorised Information Disclosure

    @@ -31994,7 +36741,7 @@

    Unauthorised Information Disclosure

    - + @@ -32067,6 +36814,7 @@

    Unauthorised Re-Identification

    @@ -32080,7 +36828,7 @@

    Unauthorised Re-Identification

    - + @@ -32150,6 +36898,7 @@

    Unauthorised Resource Use

    @@ -32163,7 +36912,7 @@

    Unauthorised Resource Use

    - + @@ -32237,6 +36986,7 @@

    Unauthorised System Access

    @@ -32250,7 +37000,7 @@

    Unauthorised System Access

    - + @@ -32323,6 +37073,7 @@

    Unauthorised System Modification

    @@ -32336,7 +37087,7 @@

    Unauthorised System Modification

    - + @@ -32410,6 +37161,7 @@

    Unwanted Code Deletion

    @@ -32423,7 +37175,7 @@

    Unwanted Code Deletion

    - + @@ -32497,6 +37249,7 @@

    Unwanted Data Deletion

    @@ -32510,7 +37263,7 @@

    Unwanted Data Deletion

    - + @@ -32583,6 +37336,7 @@

    Unwanted Disclosure of Data

    @@ -32596,7 +37350,7 @@

    Unwanted Disclosure of Data

    - + @@ -32665,7 +37419,8 @@

    User Risks

    - @@ -33251,7 +38006,9 @@

    Violating Code of Conduct

    - @@ -33264,7 +38021,7 @@

    Violating Code of Conduct

    - + @@ -33309,7 +38066,7 @@

    Violating Code of Conduct

    -

    Violation of Contractual Obligation

    +

    Violating Contractual Obligation

    TermSystemMalfunctionTechnicalRiskConcept Prefix risk
    LabelSystem MalfunctionTechnical Risk Concept
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#TechnicalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionRisk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process
    Usage NoteHere system refers to both hardware and software systemsTechnical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Broader/Parent types risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismConcept representing Terrorism
    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesConcept representing Unauthorised Access to Premises
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcept representing Unauthorised Activity
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code AccessConcept representing Unauthorised Code Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureConcept representing Unauthorised Code Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code ModificationConcept representing Unauthorised Code Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data AccessConcept representing Unauthorised Data Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureConcept representing Unauthorised Data Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data ModificationConcept representing Unauthorised Data Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureConcept representing Unauthorised Information Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationConcept representing Unauthorised Re-Identification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Resource UseConcept representing Unauthorised Resource Use
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System AccessConcept representing Unauthorised System Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System ModificationConcept representing Unauthorised System Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Code DeletionConcept representing Unwanted Code Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Data DeletionConcept representing Unwanted Data Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataConcept representing Unwanted Disclosure of Data
    Broader/Parent types dpv:RiskConcept + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Code of ConductConcept representing Violation of Code of Conduct
    Usage Note
    @@ -33320,7 +38077,7 @@

    Violation of Contractual Obligation

    - + @@ -33336,7 +38093,15 @@

    Violation of Contractual Obligation

    - + + @@ -33349,7 +38114,7 @@

    Violation of Contractual Obligation

    - + @@ -33421,7 +38186,9 @@

    Violating Ethics Code

    - @@ -33434,7 +38201,7 @@

    Violating Ethics Code

    - + @@ -33479,7 +38246,7 @@

    Violating Ethics Code

    -

    Violation of Legal Obligations

    +

    Violating Legal Obligation

    LabelViolation of Contractual ObligationViolating Contractual Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsConcept representing Violation of Contractual Obligations
    Usage Note
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Ethics CodeConcept representing Violation of Ethics Code
    Usage Note
    @@ -33490,7 +38257,7 @@

    Violation of Legal Obligations

    - + @@ -33506,7 +38273,15 @@

    Violation of Legal Obligations

    - + + @@ -33519,7 +38294,7 @@

    Violation of Legal Obligations

    - + @@ -33563,6 +38338,81 @@

    Violation of Legal Obligations

    +
    +

    Violating Obligation

    +
    LabelViolation of Legal ObligationsViolating Legal Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Legal ObligationsConcept representing Violation of Legal Obligations
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingObligationPrefixrisk
    LabelViolating Obligation
    IRIhttps://w3id.org/dpv/risk#ViolatingObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +

    Violating Policy

    @@ -33591,7 +38441,9 @@

    Violating Policy

    - @@ -33604,7 +38456,7 @@

    Violating Policy

    - + @@ -33633,8 +38485,83 @@

    Violating Policy

    +
    +

    Violating Prohibition

    +
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policyConcept representing violation of policy which can be either internal or external policy
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingProhibitionPrefixrisk
    LabelViolating Prohibition
    IRIhttps://w3id.org/dpv/risk#ViolatingProhibition
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +
    -

    Violation of Statutory Obligations

    +

    Violating Statutory Obligations

    @@ -33645,7 +38572,7 @@

    Violation of Statutory Obligations

    - + @@ -33661,7 +38588,15 @@

    Violation of Statutory Obligations

    - + + @@ -33674,7 +38609,7 @@

    Violation of Statutory Obligations

    - + @@ -33749,6 +38684,8 @@

    Violence against children

    @@ -33761,7 +38698,7 @@

    Violence against children

    - + @@ -34124,74 +39061,78 @@

    caused by threat

    -
    -

    caused by vulnerability

    -
    LabelViolation of Statutory ObligationsViolating Statutory Obligations
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Statutory ObligationsConcept representing Violation of Statutory Obligations
    Usage Note Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Child ViolenceConcept representing Child Violence
    Usage Note
    - - - - - - - - - - - - - - - - - - - - - - - +
    +

    caused by vulnerability

    +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability +
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK +
    +
    + + - - - - - - Range includes - risk:Vulnerability - - - - - - Definition - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - - - - - - - - - - Date Created - 2024-02-14 - - - - - - - See More: - section CORE in RISK - - - - -
    @@ -34277,12 +39218,32 @@

    caused by vulnerability

    + + + + + + + + + + + + + + + + + + + + + + - - @@ -34568,6 +39529,18 @@

    exploits vulnerability

    + + + + + + + + + + + + @@ -34646,7 +39619,7 @@

    has control

    See More: - section CORE in RISK + section CORE in DEX @@ -34994,6 +39967,48 @@

    has vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35107,6 +40122,7 @@

    has vulnerability

    +
    @@ -35497,6 +40513,61 @@

    is vulnerability of

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35696,10 +40767,100 @@

    refers to risk

    - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36640,6 +41801,12 @@

    External

    + + + + + + @@ -36658,6 +41825,12 @@

    External

    + + + + + + @@ -36672,6 +41845,7 @@

    External

    + @@ -36690,6 +41864,17 @@

    External

    + + + + + + + + + + + @@ -36792,6 +41977,18 @@

    External

    + + + + + + + + + + + + @@ -36879,6 +42076,12 @@

    External

    + + + + + + @@ -36890,6 +42093,42 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36961,6 +42200,7 @@

    External

    + @@ -37042,6 +42282,7 @@

    External

    + @@ -37075,12 +42316,36 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + @@ -37192,6 +42457,7 @@

    External

    + @@ -37210,6 +42476,11 @@

    External

    + + + + + @@ -37223,6 +42494,24 @@

    External

    + + + + + + + + + + + + + + + + + + @@ -37263,6 +42552,12 @@

    External

    + + + + + + @@ -37740,6 +43035,78 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -37770,6 +43137,7 @@

    External

    + @@ -37815,6 +43183,13 @@

    External

    + + + + + + + @@ -37992,6 +43367,16 @@

    External

    + + + + + + + + + + diff --git a/2.1-dev/risk/index.html b/2.1-dev/risk/index.html index d082f005d..35ffb9e3b 100644 --- a/2.1-dev/risk/index.html +++ b/2.1-dev/risk/index.html @@ -13,7 +13,7 @@ title: "Risk Concepts (RISK)", subtitle: "version 2.1-dev", publishDate: "2024-08-18", - specStatus: "CG-FINAL", + specStatus: "CG-DRAFT", group: "dpvcg", latestVersion: "https://w3id.org/dpv/risk", canonicalUri: "https://w3id.org/dpv/risk", @@ -643,33 +643,42 @@

    Core Concepts

    -
    -
    -

    Likelihood, Severity, and Levels

    -

    To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

    -
      -
    • Likelihood: -
        -
      • [=3LikelihoodLevels=] which contains 3 likelihood levels of [=HighLikelihood=] (0.75), [=ModerateLikelihood=] (0.5), and [=LowLikelihood=] (0.25)
      • -
      • [=5LikelihoodLevels=] which contains the 3 likelihood levels from [=3LikelihoodLevels=] as well as [=VeryHighLikelihood=] (0.9) and [=VeryLowLikelihood=] (0.1)
      • -
      • [=7LikelihoodLevels=] which contains the 5 likelihood levels from [=5LikelihoodLevels=] as well as [=ExtremelyHighLikelihood=] (0.99) and [=ExtremelyLowLikelihood=] (0.01)
      • -
    • -
    • Severity: -
        -
      • [=3SeverityLevels=] which contains 3 Severity levels of [=HighSeverity=] (0.75), [=ModerateSeverity=] (0.5), and [=LowSeverity=] (0.25)
      • -
      • [=5SeverityLevels=] which contains the 3 Severity levels from [=3SeverityLevels=] as well as [=VeryHighSeverity=] (0.9) and [=VeryLowSeverity=] (0.1)
      • -
      • [=7SeverityLevels=] which contains the 5 Severity levels from [=5SeverityLevels=] as well as [=ExtremelyHighSeverity=] (0.99) and [=ExtremelyLowSeverity=] (0.01)
      • -
    • -
    • RiskLevel: -
        -
      • [=3RiskLevels=] which contains 3 RiskLevel levels of [=HighRisk=] (0.75), [=ModerateRisk=] (0.5), and [=LowRisk=] (0.25)
      • -
      • [=5RiskLevels=] which contains the 3 RiskLevel levels from [=3RiskLevels=] as well as [=VeryHighRisk=] (0.9) and [=VeryLowRisk=] (0.1)
      • -
      • [=7RiskLevels=] which contains the 5 RiskLevel levels from [=5RiskLevels=] as well as [=ExtremelyHighRisk=] (0.99) and [=ExtremelyLowRisk=] (0.01)
      • -
    • -
    +
    +

    Risk Management

    +

    lorem ipsum

    +
    + +
    +

    Risk Assessment

    +

    lorem ipsum

    +
    + +
    +

    Likelihood, Severity, and Levels

    +

    To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

    +
      +
    • Likelihood: +
        +
      • [=3LikelihoodLevels=] which contains 3 likelihood levels of [=HighLikelihood=] (0.75), [=ModerateLikelihood=] (0.5), and [=LowLikelihood=] (0.25)
      • +
      • [=5LikelihoodLevels=] which contains the 3 likelihood levels from [=3LikelihoodLevels=] as well as [=VeryHighLikelihood=] (0.9) and [=VeryLowLikelihood=] (0.1)
      • +
      • [=7LikelihoodLevels=] which contains the 5 likelihood levels from [=5LikelihoodLevels=] as well as [=ExtremelyHighLikelihood=] (0.99) and [=ExtremelyLowLikelihood=] (0.01)
      • +
    • +
    • Severity: +
        +
      • [=3SeverityLevels=] which contains 3 Severity levels of [=HighSeverity=] (0.75), [=ModerateSeverity=] (0.5), and [=LowSeverity=] (0.25)
      • +
      • [=5SeverityLevels=] which contains the 3 Severity levels from [=3SeverityLevels=] as well as [=VeryHighSeverity=] (0.9) and [=VeryLowSeverity=] (0.1)
      • +
      • [=7SeverityLevels=] which contains the 5 Severity levels from [=5SeverityLevels=] as well as [=ExtremelyHighSeverity=] (0.99) and [=ExtremelyLowSeverity=] (0.01)
      • +
    • +
    • RiskLevel: +
        +
      • [=3RiskLevels=] which contains 3 RiskLevel levels of [=HighRisk=] (0.75), [=ModerateRisk=] (0.5), and [=LowRisk=] (0.25)
      • +
      • [=5RiskLevels=] which contains the 3 RiskLevel levels from [=3RiskLevels=] as well as [=VeryHighRisk=] (0.9) and [=VeryLowRisk=] (0.1)
      • +
      • [=7RiskLevels=] which contains the 5 RiskLevel levels from [=5RiskLevels=] as well as [=ExtremelyHighRisk=] (0.99) and [=ExtremelyLowRisk=] (0.01)
      • +
    • +
    -
      +
      • risk:3LikelihoodLevels: Scale with 3 Likelihood Levels from High to Low go to full definition @@ -951,6 +960,7 @@

        Likelihood, Severity, and Levels

      +
    @@ -1340,6 +1350,63 @@

    Taxonomies

    Potential Risk Sources

      +
    • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
    • +
    • + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • +
    • + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
          +
        • + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition + +
        • +
        • + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition + +
        • +
        • + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
            +
          • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition + +
          • +
          • + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition + +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition + +
    • +
    • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -1455,12 +1522,12 @@

        Potential Risk Sources

        go to full definition
        • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser go to full definition
        • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised go to full definition
        • @@ -1469,237 +1536,232 @@

          Potential Risk Sources

          go to full definition
          • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
          • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
          • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
          • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
          • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
          • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
          • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
          • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
          • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
          • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
          • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
        • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
          • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
          • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
          • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
            • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
          • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
          • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
          • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
        • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + risk:UnauthorisedActivity: Concept representing Unauthorised Activity go to full definition
          • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises go to full definition
          • - risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access go to full definition
          • - risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure go to full definition
          • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification go to full definition
          • - risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access go to full definition
          • - risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure go to full definition
          • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification go to full definition
          • - risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure go to full definition
          • - risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification go to full definition
          • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use go to full definition
          • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access go to full definition
          • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification go to full definition
          • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion go to full definition
          • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion go to full definition
          • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data go to full definition
        -
      • -
      • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition -
      • risk:OperationalSecurityRisk: Risks and issues that arise during operational processes go to full definition
        • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + risk:AuthorisationFailure: Concept representing Authorisation Failure go to full definition
        • - risk:ComponentFailure: Something that acts as or causes Component Failure + risk:ComponentFailure: Concept representing Component Failure go to full definition
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + risk:ComponentMalfunction: Concept representing Component Malfunction go to full definition
        • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
        • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
        • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
        • - risk:Reidentification: Something that acts as or causes Re-identification + risk:Reidentification: Concept representing Re-identification go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach + risk:SecurityBreach: Concept representing Security Breach go to full definition
          • - risk:DataBreach: Something that acts as or causes Data Breach + risk:DataBreach: Concept representing Data Breach go to full definition
            • @@ -1708,7 +1770,7 @@

              Potential Risk Sources

            • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + risk:ConfidentialityBreach: Concept representing Confidentiality Breach go to full definition
            • @@ -1722,47 +1784,17 @@

              Potential Risk Sources

          • - risk:SystemFailure: Something that acts as or causes System Failure + risk:SystemFailure: Concept representing System Failure go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction + risk:SystemMalfunction: Concept representing System Malfunction go to full definition
        • -
        • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition -
    @@ -1772,285 +1804,153 @@

    Potential Risk Sources

    Potential Risks

    • - risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - go to full definition -
        -
      • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
          -
        • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition - -
        • -
        • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
        • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
        • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
        • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
        • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
        • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
        • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition - -
        • -
        -
      • -
      • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition
        • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition - -
        • -
        • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition - -
        • -
        • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition - -
        • -
        • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:LegalComplianceRisk: Risks and consequences regarding legal compliance and its violation + go to full definition
          • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition - -
          • -
          • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition - -
          • -
          • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition -
              -
            • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
            • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:IllegalDataProcessing: Concept representing Illegal Processing of Data + go to full definition
            • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:PublicOrderBreach: Concept representing Public Order Breach + go to full definition
            • -
            -
          • -
          -
        • -
        -
      • -
      -
    • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
    • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
    • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
    • -
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - +
  • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:LegallyRelevantConsequence: A consequence that is legally relevant i.e. actionable under law + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition - -
    • -
    • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition -
        -
      • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition - -
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:MaterialDamage: Concept representing Material Damage + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:NonMaterialDamage: Concept representing Non-Material Damage + go to full definition
    • -
    -
  • - risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals - go to full definition -
      -
    • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
    • -
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition - -
    • -
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
    • @@ -2058,229 +1958,369 @@

      Potential Risks

      go to full definition
      • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
      • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
      • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
      • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
      • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
      • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
    • - risk:OperationalSecurityRisk: Risks and issues that arise during operational processes - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
            +
          • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
          • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
          • +
          +
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
              +
            • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
            • +
            +
          • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
          • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
          • +
          +
        • +
        +
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
        • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
        • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
          • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
        • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
      • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition
        • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate go to full definition
          • @@ -2399,58 +2439,16 @@

            Potential Risks

        • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition - -
        • -
        • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
        • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition
          • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition - -
          • -
          • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition - -
          • -
          • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition - -
          • -
          • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition - -
          • -
          • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition - -
          • -
          • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition - -
          • -
          • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition - -
          • -
          -
        • -
        • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + risk:SocialDisadvantage: Concept representing Social Disadvantage go to full definition
        • @@ -2460,161 +2458,131 @@

          Potential Risks

        • - risk:Terrorism: Something that acts as or causes Terrorism + risk:Terrorism: Concept representing Terrorism go to full definition
      • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition
      • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition -
      • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
      • -
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition - +
    • -
    • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition - +
  • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition - -
  • -
    -
    - -
    -

    Potential Consequences

    -
      + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -2726,98 +2694,79 @@

        Potential Consequences

    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition - -
    • -
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition - -
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
      • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:AuthorisationFailure: Concept representing Authorisation Failure + go to full definition
      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
      • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
      • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - -
      • -
      • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
      • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
      • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition
        • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:DataBreach: Concept representing Data Breach + go to full definition -
        • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition - +
        • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
        • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
        @@ -2825,257 +2774,271 @@

        Potential Consequences

    • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
    +
    + +
    +

    Potential Consequences

    +
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
        -
      • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:Detriment: Something that acts as or causes Detriment - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
      • - risk:IllegalDataProcessing: Something that acts as or causes Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
      • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:DataCorruption: Concept representing Corruption of Data + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
      • - risk:PublicOrderBreach: Something that acts as or causes Public Order Breach - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
      • -
      -
    • - risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others - go to full definition -
        + risk:EquipmentFailure: Concept representing Equipment Failure + go to full definition + +
      • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:EquipmentMalfunction: Concept representing Equipment Malfunction + go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud - go to full definition + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:ViolatingCodeOfConduct: Concept representing Violation of Code of Conduct + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:ViolatingEthicsCode: Concept representing Violation of Ethics Code + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition - -
        • + risk:ViolatingObligation: Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + go to full definition +
          • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
          • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
          • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
          • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
            -
          • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition - @@ -3083,379 +3046,487 @@

            Potential Consequences

        • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition -
            -
          • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition
            • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:Blackmail: Concept representing Blackmail + go to full definition
            • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:Coercion: Concept representing Coercion + go to full definition
            • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:Extorsion: Concept representing Extorsion + go to full definition
            • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:Fraud: Concept representing Fraud + go to full definition
            • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:IdentityFraud: Concept representing Identity Fraud + go to full definition
            • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:IdentityTheft: Concept representing Identity Theft + go to full definition
            • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:InterceptCommunications: Concept representing Interception of Communications + go to full definition
            • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:PhishingScam: Concept representing Phishing Scam + go to full definition
            • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:Sabotage: Concept representing Sabotage + go to full definition
            • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition -
            • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
                +
              • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition
              • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition
              • +
              +
            • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
              • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
                  +
                • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
                • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
                    +
                  • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
                      +
                    • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
                    • +
                    +
                  • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
                  • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
                • +
                +
              • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition
                • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:LoseCredibility: Concept representing Loss of Credibility + go to full definition
                • -
                +
              • + risk:LoseCustomerConfidence: Concept representing Loss of Customer Confidence + go to full definition +
              • -
              +
            • + risk:LoseGoodwill: Concept representing Loss of Goodwill + go to full definition +
            • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:LoseNegotiatingCapacity: Concept representing Loss of Negotiating Capacity + go to full definition
            • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:LoseOpportunity: Concept representing Loss of Opportunity + go to full definition
            • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition - +
            • +
            • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition +
              • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:CustomerSupportLimited: Concept representing customer support to be limited + go to full definition
              • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DelayedApplicationProcessing: Concept representing delayed processing of applications + go to full definition
              • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:IdentityVerificationFailure: Concept representing failure to verify identity + go to full definition
              • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:InabilityToEnterIntoContract: Stub + go to full definition
              • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:InabilityToEstablishLegalClaims: Stub + go to full definition
              • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition + risk:InabilityToFulfillLegalObligations: Stub + go to full definition
              • -
              +
            • + risk:InabilityToProcessPayments: Stub + go to full definition +
            • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:InabilityToProtectVitalInterests: Stub + go to full definition
            • - risk:SocietalHealthSafety: None - go to full definition + risk:InabilityToProvideHealthCare: Stub + go to full definition
            • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:LegalSupportLimited: Stub + go to full definition
            • -
            +
          • + risk:LoyaltyProgramExclusion: Stub + go to full definition +
          • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:PersonalisationDisabled: Stub + go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction - go to full definition + risk:PersonalisationEnabled: Stub + go to full definition
          • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition - +
          • +
          +
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition + +
        • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
            +
          • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
              +
            • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
            • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
            • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
            • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
            • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
            • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition
            • -
    -
    - -
    -

    Potential Impacts

    -
    • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
    • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition -
        + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition
        • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition
        • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
      • +
      +
    • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
    • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Concept representing Terrorism + go to full definition +
    @@ -3464,7 +3535,12 @@

    Potential Impacts

    go to full definition
    • - risk:Harm: Something that acts as or causes Harm to humans + risk:ExposureToHarmfulSpeech: Concept representing Harmful Speech + go to full definition + +
    • +
    • + risk:Harm: Concept representing Harm to humans go to full definition
      • @@ -3473,12 +3549,12 @@

        Potential Impacts

      • - risk:Injury: Something that acts as or causes Injury + risk:Injury: Concept representing Injury go to full definition
      • - risk:PhysicalAssault: Something that acts as or causes Physical Assault + risk:PhysicalAssault: Concept representing Physical Assault go to full definition
      • @@ -3488,7 +3564,7 @@

        Potential Impacts

      • - risk:PsychologicalHarm: Something that acts as or causes Psychological Harm + risk:PsychologicalHarm: Concept representing Psychological Harm go to full definition
      • @@ -3498,12 +3574,12 @@

        Potential Impacts

      • - risk:SexualViolence: Something that acts as or causes Sexual Violence + risk:SexualViolence: Concept representing Sexual Violence go to full definition
      • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence + risk:ViolenceAgainstChildren: Concept representing Child Violence go to full definition
      • @@ -3513,6 +3589,11 @@

        Potential Impacts

        risk:IndividualHealthSafety: None go to full definition + +
      • + risk:PersonalSafetyEndangerment: Concept representing Personal Safety Endangerment + go to full definition +
      • risk:Privacy: None @@ -3522,266 +3603,1860 @@

        Potential Impacts

    • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition -
          -
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
        • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
        • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
        • +
        +
      • +
      +
    • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
    • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
    • -
    -
  • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition
    • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition
      • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
        • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
        • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
        • +
        +
      • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
        • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
          • - risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
          • - risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
          • -
          +
        • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
            +
          • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition +
          • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
          • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
          • +
          +
        • +
        +
      • +
      +
    • +
    +
  • + +
  • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition
    • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition
    • - risk:Misandry: Dislike, contempt, or prejudice against men - go to full definition + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition
    • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition
    • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition
    • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition
    • -
    +
  • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition +
  • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition -
      + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
    • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition
    • -
    +
  • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition +
  • - +
  • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition +
  • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition
  • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition
  • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition -
      + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
    • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition
    • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition
    • +
    +
  • +
    +
    + +
    +

    Potential Impacts

    +
    • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
    • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
    • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
    • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
        • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
          • -
    -
    - -
    -

    Overview of Concepts and Roles

    - - - - - - - - - - - - - - +
  • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
  • +
  • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
  • + + + + +
  • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • +
  • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition + +
  • + + +
  • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
  • +
  • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition + +
  • + + + +
    +

    Technical Risk Concepts

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
        +
      • + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition + +
      • +
      • + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition + +
      • +
      • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
      • +
      • + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it + go to full definition +
          +
        • + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition + +
        • +
        • + risk:Cryptojacking: Concept representing Cryptojacking + go to full definition + +
        • +
        • + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) + go to full definition +
            +
          • + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) + go to full definition + +
          • +
          +
        • +
        • + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack + go to full definition + +
        • +
        • + risk:MalwareAttack: Concept representing Malware Attack + go to full definition + +
        • +
        • + risk:SystemIntrusion: Concept representing System Intrusion + go to full definition + +
        • +
        +
      • +
      • + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
          +
        • + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition + +
        • +
        • + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition + +
        • +
        • + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition + +
        • +
        • + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition + +
        • +
        • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
        • +
        • + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition + +
        • +
        • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition + +
        • +
        • + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition + +
        • +
        • + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition + +
        • +
        • + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
        • +
        • + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition + +
        • +
        • + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition + +
    • +
    +
    + +
    +

    Organisational Risk Concepts

    +
    +
    + +
    +

    Societal Risk Concepts

    +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
    + + + +
    +

    Overview of Concepts and Roles

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality
    + + + + + + + + + + + + + @@ -4007,6 +5682,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4067,6 +5752,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4082,7 +5777,7 @@

    Overview of Concepts and Roles

    - + @@ -4117,6 +5812,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4127,6 +5832,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4158,7 +5873,7 @@

    Overview of Concepts and Roles

    - + @@ -4237,6 +5952,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4277,6 +6002,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4337,6 +6072,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4357,6 +6102,66 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4478,13 +6283,43 @@

    Overview of Concepts and Roles

    - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4557,6 +6392,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4677,6 +6522,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4697,6 +6552,26 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + @@ -4737,6 +6612,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4767,6 +6652,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4858,7 +6753,7 @@

    Overview of Concepts and Roles

    - + @@ -4868,7 +6763,7 @@

    Overview of Concepts and Roles

    - + @@ -4878,7 +6773,7 @@

    Overview of Concepts and Roles

    - + @@ -4888,7 +6783,7 @@

    Overview of Concepts and Roles

    - + @@ -4898,7 +6793,7 @@

    Overview of Concepts and Roles

    - + @@ -4908,7 +6803,7 @@

    Overview of Concepts and Roles

    - + @@ -4928,7 +6823,7 @@

    Overview of Concepts and Roles

    - + @@ -5007,6 +6902,126 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -5098,8 +7113,8 @@

    Overview of Concepts and Roles

    - - + + @@ -5157,6 +7172,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5387,6 +7412,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5397,6 +7432,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5422,192 +7467,2009 @@

    Overview of Concepts and Roles

    - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    +
    + +
    +

    Rights Impacts

    +

    lorem ipsum

    +
    + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality Integrity Availability
    risk:CustomerSupportLimited
    risk:Damage
    risk:DelayedApplicationProcessing
    risk:DenialServiceAttack
    risk:DisproportionateEnergyConsumption
    risk:DistributedDenialServiceAttack
    risk:Earthquake
    risk:EnvironmentalRisk
    risk:ErroneousSystemUserisk:ErroneousUse
    risk:Floods
    risk:Fraud
    risk:GroupRisk
    risk:Harassment
    risk:IdentityVerificationFailure
    risk:IllegalDataProcessing
    risk:InabilityToEnterIntoContract
    risk:InabilityToEstablishLegalClaims
    risk:InabilityToFulfillLegalObligations
    risk:InabilityToProcessPayments
    risk:InabilityToProtectVitalInterests
    risk:InabilityToProvideHealthCare
    risk:IndirectDiscrimination
    risk:LegalRiskrisk:LegalComplianceRisk
    risk:LegallyRelevantConsequence
    risk:LegalRiskConcept
    risk:LegalSupportLimited
    risk:LoyaltyProgramExclusion
    risk:MaliciousActivity
    risk:OrganisationalRiskConcept
    risk:OutGroupHomogeneityBias
    risk:PersonalisationDisabled
    risk:PersonalisationEnabled
    risk:PersonalSafetyEndangerment
    risk:PolicyRisk
    risk:Privacy
    risk:PublicServicesExclusion
    risk:RacialDiscrimination
    risk:RightErodedrisk:RightsDenied
    risk:RightObstructedrisk:RightsEroded
    risk:RightsDenialrisk:RightsExercisePrevented
    risk:RightsExercisePreventionrisk:RightsImpact
    risk:RightsImpactrisk:RightsLimited
    risk:RightsLimitationrisk:RightsObstructed
    risk:RightsViolationrisk:RightsViolated
    risk:ServiceAlternativeOffered
    risk:ServiceCostIncreased
    risk:ServiceDenied
    risk:ServiceLimited
    risk:ServiceNotProvided
    risk:ServicePartiallyProvided
    risk:ServiceProvided
    risk:ServiceProvisionDelayed
    risk:ServiceQualityReduced
    risk:ServiceRelatedConsequence
    risk:ServiceSecurityReduced
    risk:ServiceTermination
    risk:SexDiscrimination
    risk:SocietalRiskrisk:SocietalRiskConcept
    risk:TechnicalRiskConcept
    risk:Terrorism
    risk:ViolatingObligation
    risk:ViolatingPolicy
    risk:ViolatingProhibition
    risk:ViolatingStatutoryObligations
    + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing accidental misuse (of something)
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 3x3

    -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    - - - - - + + + + + + + + + + - - - - + + + +
    LowModerateHigh
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + - - - - + + + + - - - - + + -
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]TermBenefitPrefixrisk
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]LabelBenefit
    -
    + + IRI + https://w3id.org/dpv/risk#Benefit + + + + + + Type + rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk + + + + Broader/Parent types + risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept + + + -
    -

    Risk Matrix 5x5

    - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + +
    Very LowLowModerateHighVery High
    DefinitionConcept representing benefits - both material and immaterial
    Usage NoteEven though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermBiasPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelBias
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]See More: section RISK-TAXONOMY in AI +
    + +
    - -
    -

    Risk Matrix 7x7

    - + + + + + + + +
    +

    Blackmail

    +
    + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely HighTermBlackmailPrefixrisk
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]TermBruteForceAuthorisationsPrefixrisk
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + - - - - - - - - + + + + - - - - - - - - + + -
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]TermCasteDiscriminationPrefixrisk
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]LabelCaste Discrimination
    -
    + + IRI + https://w3id.org/dpv/risk#CasteDiscrimination + + + + + + Type + rdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept + + + + Broader/Parent types + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept + + + + + + + + + + + + Definition + Discrimination based on a person's caste, a form of social stratification found in some cultures + + + -
    + + + + + + + Date Created + 2024-09-30 + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    @@ -5615,11 +9477,169 @@

    Classes

    +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    @@ -5627,21 +9647,251 @@

    Classes

    +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5649,7 +9899,76 @@

    Classes

    +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5657,7 +9976,76 @@

    Classes

    +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5667,7 +10055,85 @@

    Classes

    +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5675,7 +10141,85 @@

    Classes

    +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5683,44 +10227,43 @@

    Classes

    - -
    -

    3 Likelihood Levels

    +
    +

    Confidentiality Breach

    - + - + - + - + - - - - - + @@ -5729,22 +10272,28 @@

    3 Likelihood Levels

    - + - + + + + - + - + + + + @@ -5753,7 +10302,7 @@

    3 Likelihood Levels

    - @@ -5761,44 +10310,39 @@

    3 Likelihood Levels

    - -
    -

    3 Risk Levels

    +
    +

    Confidentiality Concept

    Term3LikelihoodLevelsConfidentialityBreach Prefix risk
    Label3 Likelihood LevelsConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to LowConcept representing Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -5807,9 +10351,12 @@

    3 Risk Levels

    - + - + + + + @@ -5820,7 +10367,7 @@

    3 Risk Levels

    - + @@ -5831,7 +10378,7 @@

    3 Risk Levels

    - @@ -5839,42 +10386,42 @@

    3 Risk Levels

    - -
    -

    3 Severity Levels

    +
    +

    Confidentiality Incident

    Term3RiskLevelsConfidentialityConcept Prefix risk
    Label3 Risk LevelsConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - @@ -5885,7 +10432,7 @@

    3 Severity Levels

    - + @@ -5898,18 +10445,15 @@

    3 Severity Levels

    - + - - - - + - @@ -5918,43 +10462,45 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Confirmation Bias

    Term3SeverityLevelsConfidentialityIncident Prefix risk
    Label3 Severity LevelsConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionScale with 3 Severity Levels from High to LowIncident where the confidentiality of information or system has been affected
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -5963,31 +10509,34 @@

    5 Likelihood Levels

    - + - + + + + - + - + - @@ -5996,43 +10545,46 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + +
    +

    Confounding Variables Bias

    Term5LikelihoodLevelsConfirmationBias Prefix risk
    Label5 Likelihood LevelsConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6041,31 +10593,34 @@

    5 Risk Levels

    - + - + + + + - + - + - @@ -6074,41 +10629,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    +
    +

    Consequence Control

    Term5RiskLevelsConfoundingVariablesBias Prefix risk
    Label5 Risk LevelsConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very LowBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -6119,7 +10678,7 @@

    5 Severity Levels

    - + @@ -6132,7 +10691,7 @@

    5 Severity Levels

    - + @@ -6143,7 +10702,7 @@

    5 Severity Levels

    - @@ -6152,41 +10711,45 @@

    5 Severity Levels

    -
    -

    7 Likelihood Levels

    +
    +

    Containment Control

    Term5SeverityLevelsConsequenceControl Prefix risk
    Label5 Severity LevelsConsequence Control
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 5 Severity Levels from Very High to Very LowRisk Mitigation Measure that controls the Consequences
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -6197,7 +10760,7 @@

    7 Likelihood Levels

    - + @@ -6210,18 +10773,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -6230,43 +10790,49 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + +
    +

    Copyright Violation

    Term7LikelihoodLevelsContainmentControl Prefix risk
    Label7 Likelihood LevelsContainment Control
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowControl to contain event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - + @@ -6275,22 +10841,28 @@

    7 Risk Levels

    - + - + + + + - + - + + + + @@ -6299,52 +10871,58 @@

    7 Risk Levels

    -
    Term7RiskLevelsCopyrightViolation Prefix risk
    Label7 Risk LevelsCopyright Violation
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowConcept representing Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    + + -
    -

    7 Severity Levels

    + + + +
    +

    Coverage Bias

    - + - + - + - + - - - - - + @@ -6353,31 +10931,34 @@

    7 Severity Levels

    - + - + + + + - + - + - @@ -6385,23 +10966,23 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    +
    +

    Cross-Border Incident

    Term7SeverityLevelsCoverageBias Prefix risk
    Label7 Severity LevelsCoverage Bias
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -6431,7 +11012,7 @@

    Accidental Incident

    - + @@ -6464,36 +11045,37 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    +
    +

    Cryptojacking

    TermAccidentalIncidentCrossBorderIncident Prefix risk
    LabelAccidental IncidentCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#CrossBorderIncident
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsIncident involving cross-border or multiple jurisdictions
    - + - + - + - + - @@ -6507,20 +11089,32 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + @@ -6537,40 +11131,36 @@

    Accidental Misuse

    -
    -

    Age Discrimination

    +
    +

    Customer Support Limited

    TermAccidentalMisuseCryptojacking Prefix risk
    LabelAccidental MisuseCryptojacking
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse - → risk:UserRisks + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionAccidental MisuseConcept representing Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - @@ -6584,7 +11174,7 @@

    Age Discrimination

    - + @@ -6597,7 +11187,7 @@

    Age Discrimination

    - + @@ -6617,36 +11207,36 @@

    Age Discrimination

    - -
    -

    Authorisation Failure

    +
    +

    Damage

    TermAgeDiscriminationCustomerSupportLimited Prefix risk
    LabelAge DiscriminationCustomer Support Limited
    IRIhttps://w3id.org/dpv/risk#AgeDiscriminationhttps://w3id.org/dpv/risk#CustomerSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's age, often impacting older or younger individualsConcept representing customer support to be limited
    Date Created2024-09-302024-10-21
    - + - + - + - + - @@ -6660,23 +11250,20 @@

    Authorisation Failure

    - + - - - - + - + @@ -6702,38 +11289,37 @@

    Authorisation Failure

    - -
    -

    None

    +
    +

    Data Aggregation Bias

    TermAuthorisationFailureDamage Prefix risk
    LabelAuthorisation FailureDamage
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureConcept representing Damage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -6745,19 +11331,31 @@

    None

    - + + + + - + + + + - + + + + - + + + + @@ -6770,35 +11368,41 @@

    None

    -
    -

    Availability Concept

    + + + + +
    +

    Data Bias

    TermAvailabilityBreachDataAggregationBias Prefix risk
    LabelNoneData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -6811,34 +11415,34 @@

    Availability Concept

    - + - - - - + - + + + + - + - + - @@ -6846,44 +11450,49 @@

    Availability Concept

    -
    -

    Availability Incident

    + + + + + + + +
    +

    Data Breach

    TermAvailabilityConceptDataBias Prefix risk
    LabelAvailability ConceptData Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcepthttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec modelBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Source
    Date Created2024-09-292024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6892,28 +11501,40 @@

    Availability Incident

    - + + + + - + + + + - + - - + + + + + + + + - @@ -6922,48 +11543,45 @@

    Availability Incident

    -
    -

    Avoid Source

    + + + + +
    +

    Data Corruption

    TermAvailabilityIncidentDataBreach Prefix risk
    LabelAvailability IncidentData Breach
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedConcept representing Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in DEX
    - + - + - + - + - - - - - + @@ -6972,22 +11590,31 @@

    Avoid Source

    - + - + + + + - + + + + - + - + + + + @@ -6996,7 +11623,7 @@

    Avoid Source

    - @@ -7008,37 +11635,37 @@

    Avoid Source

    -
    -

    Benefit

    +
    +

    Data Processing Bias

    TermAvoidSourceDataCorruption Prefix risk
    LabelAvoid SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcept representing Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7052,28 +11679,28 @@

    Benefit

    - + - + + + + - + - - - - + - + @@ -7091,35 +11718,37 @@

    Benefit

    -
    -

    Bias

    +
    +

    Delayed Application Processing

    TermBenefitDataProcessingBias Prefix risk
    LabelBenefitData Processing Bias
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Renumeration - → risk:FinancialImpact + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7132,34 +11761,28 @@

    Bias

    - + - - - - + - + - - - - + - @@ -7167,46 +11790,44 @@

    Bias

    - - - - - -
    -

    Blackmail

    +
    +

    Deliberate Incident

    TermBiasDelayedApplicationProcessing Prefix risk
    LabelBiasDelayed Application Processing
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#DelayedApplicationProcessing
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersConcept representing delayed processing of applications
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -7215,37 +11836,28 @@

    Blackmail

    - + - - - - + - + - - - - - - - - + + - @@ -7257,37 +11869,37 @@

    Blackmail

    - -
    -

    Brute Force Authorisations

    +
    +

    Denial of Service Attack (DoS)

    TermBlackmailDeliberateIncident Prefix risk
    LabelBlackmailDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes BlackmailIncident caused due to deliberate actions of a human
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + @@ -7301,7 +11913,7 @@

    Brute Force Authorisations

    - + @@ -7310,7 +11922,7 @@

    Brute Force Authorisations

    - + @@ -7340,48 +11952,47 @@

    Brute Force Authorisations

    - - - -
    -

    Caste Discrimination

    +
    +

    Detection Control

    TermBruteForceAuthorisationsDenialServiceAttack Prefix risk
    LabelBrute Force AuthorisationsDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesConcept representing Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - - - - + + + + @@ -7390,7 +12001,7 @@

    Caste Discrimination

    - + @@ -7403,7 +12014,7 @@

    Caste Discrimination

    - + @@ -7411,7 +12022,7 @@

    Caste Discrimination

    - @@ -7423,49 +12034,41 @@

    Caste Discrimination

    - -
    -

    Change Consequence

    +
    +

    Detriment

    TermCasteDiscriminationDetectionControl Prefix risk
    LabelCaste DiscriminationDetection Control
    IRIhttps://w3id.org/dpv/risk#CasteDiscriminationhttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some culturesControl to detect event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -7474,7 +12077,7 @@

    Change Consequence

    - + @@ -7487,18 +12090,21 @@

    Change Consequence

    - + - + + + + - + - @@ -7507,48 +12113,44 @@

    Change Consequence

    -
    -

    Change Impact

    + + + +
    +

    Direct Discrimination

    TermChangeConsequenceDetriment Prefix risk
    LabelChange ConsequenceDetriment
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ConsequenceConcept representing Detriment
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7557,7 +12159,7 @@

    Change Impact

    - + @@ -7570,18 +12172,15 @@

    Change Impact

    - + - - - - + - @@ -7593,37 +12192,36 @@

    Change Impact

    - -
    -

    Coercion

    +
    +

    Disability Discrimination

    TermChangeImpactDirectDiscrimination Prefix risk
    LabelChange ImpactDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ImpactOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2024-05-192024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7637,32 +12235,23 @@

    Coercion

    - + - - - - + - + - - - - - - - - + + @@ -7679,36 +12268,36 @@

    Coercion

    -
    -

    Cognitive Bias

    +
    +

    Discrimination

    TermCoercionDisabilityDiscrimination Prefix risk
    LabelCoercionDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes CoercionDiscrimination against individuals based on physical or mental disabilities
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7721,34 +12310,31 @@

    Cognitive Bias

    - + - - - - + - + - + - @@ -7760,23 +12346,23 @@

    Cognitive Bias

    -
    -

    Compensation

    +
    +

    Disproportionate Energy Consumption

    TermCognitiveBiasDiscrimination Prefix risk
    LabelCognitive BiasDiscrimination
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationDiscrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditGeorg P. Krog
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + @@ -7788,9 +12374,7 @@

    Compensation

    - @@ -7803,7 +12387,7 @@

    Compensation

    - + @@ -7816,16 +12400,10 @@

    Compensation

    - + - - - - - - - - + + @@ -7842,36 +12420,38 @@

    Compensation

    - -
    -

    Component Failure

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermCompensationDisproportionateEnergyConsumption Prefix risk
    LabelCompensationDisproportionate Energy Consumption
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#DisproportionateEnergyConsumption
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsThe occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised
    Date Created2024-04-142024-10-21
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7885,23 +12465,32 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + @@ -7918,37 +12507,35 @@

    Component Failure

    - -
    -

    Component Malfunction

    +
    +

    Earthquake

    TermComponentFailureDistributedDenialServiceAttack Prefix risk
    LabelComponent FailureDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureConcept representing Distributed Denial of Service Attack (DDoS)
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7961,12 +12548,9 @@

    Component Malfunction

    - + - - - - + @@ -7975,7 +12559,10 @@

    Component Malfunction

    - + + + + @@ -7990,47 +12577,44 @@

    Component Malfunction

    - - - - - - - -
    -

    Compromise Account

    +
    +

    Environmental Incident

    TermComponentMalfunctionEarthquake Prefix risk
    LabelComponent MalfunctionEarthquake
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#Earthquake
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionThe occurence or potential occurence of earthquakes
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-10-21
    - + - + - + - + - - + + + + @@ -8039,37 +12623,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -8081,36 +12656,35 @@

    Compromise Account

    - -
    -

    Compromise Account Credentials

    +
    +

    Environmental Risk

    TermCompromiseAccountEnvironmentalIncident Prefix risk
    LabelCompromise AccountEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8124,32 +12698,23 @@

    Compromise Account Credentials

    - + - - - - + - + - - - - - - - - + + @@ -8167,37 +12732,36 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Equipment Failure

    TermCompromiseAccountCredentialsEnvironmentalRisk Prefix risk
    LabelCompromise Account CredentialsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedRisks and issues that have their origin in environment or can affect the environment at large
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -8211,9 +12775,12 @@

    Confidentiality Breach

    - + - + + + + @@ -8249,35 +12816,42 @@

    Confidentiality Breach

    -
    -

    Confidentiality Concept

    + + + + + +
    +

    Equipment Malfunction

    TermConfidentialityBreachEquipmentFailure Prefix risk
    LabelConfidentiality BreachEquipment Failure
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Confidentiality BreachConcept representing Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    - + - + - + - + - @@ -8290,25 +12864,31 @@

    Confidentiality Concept

    - + - + - + + + + - + - + + + + @@ -8317,7 +12897,7 @@

    Confidentiality Concept

    - @@ -8325,44 +12905,45 @@

    Confidentiality Concept

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Erroneous Use

    TermConfidentialityConceptEquipmentMalfunction Prefix risk
    LabelConfidentiality ConceptEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcepthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec modelConcept representing Equipment Malfunction
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impactHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8371,28 +12952,37 @@

    Confidentiality Incident

    - + - + + + + - + - - + + + + + + + + - @@ -8404,37 +12994,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    +
    +

    Ethnic Discrimination

    TermConfidentialityIncidentErroneousUse Prefix risk
    LabelConfidentiality IncidentErroneous Use
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#ErroneousUse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affectedConcept representing erroneous use (of something)
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8447,29 +13038,23 @@

    Confirmation Bias

    - + - - - - + - + - - - - + @@ -8486,38 +13071,37 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    +
    +

    Excellence Discrimination

    TermConfirmationBiasEthnicDiscrimination Prefix risk
    LabelConfirmation BiasEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationDiscrimination against individuals based on their ethnicity or cultural heritage
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -8530,29 +13114,23 @@

    Confounding Variables Bias

    - + - - - - + - + - - - - + @@ -8566,47 +13144,46 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    + + + + + +
    +

    Exposure to Harmful Speech

    TermConfoundingVariablesBiasExcellenceDiscrimination Prefix risk
    LabelConfounding Variables BiasExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8615,22 +13192,31 @@

    Consequence Control

    - + - + + + + - + + + + - + - + + + + @@ -8639,7 +13225,7 @@

    Consequence Control

    - @@ -8648,47 +13234,41 @@

    Consequence Control

    -
    -

    Containment Control

    + +
    +

    External Security Threat

    TermConsequenceControlExposureToHarmfulSpeech Prefix risk
    LabelConsequence ControlExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the ConsequencesConcept representing Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8697,7 +13277,7 @@

    Containment Control

    - + @@ -8708,17 +13288,14 @@

    Containment Control

    - - - - + - @@ -8729,35 +13306,40 @@

    Containment Control

    -
    -

    Copyright Violation

    + + +
    +

    Extorsion

    TermContainmentControlExternalSecurityThreat Prefix risk
    LabelContainment ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain eventConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8770,7 +13352,7 @@

    Copyright Violation

    - + @@ -8779,7 +13361,7 @@

    Copyright Violation

    - + @@ -8806,51 +13388,47 @@

    Copyright Violation

    TermCopyrightViolationExtorsion Prefix risk
    LabelCopyright ViolationExtorsion
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ViolatingObligation + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationConcept representing Extorsion
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - - - - - -
    -

    Coverage Bias

    +
    +

    Extremely High Likelihood

    - + - + - + - + - - + + + + @@ -8859,34 +13437,34 @@

    Coverage Bias

    - + - + + + + - - - - + - + - + - @@ -8894,42 +13472,43 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Extremely High Risk

    TermCoverageBiasExtremelyHighLikelihood Prefix risk
    LabelCoverage BiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -8940,9 +13519,12 @@

    Cross-Border Incident

    - + - + + + + @@ -8953,15 +13535,18 @@

    Cross-Border Incident

    - + - + + + + - @@ -8970,44 +13555,44 @@

    Cross-Border Incident

    - - - -
    -

    Cryptojacking

    +
    +

    Extremely High Severity

    TermCrossBorderIncidentExtremelyHighRisk Prefix risk
    LabelCross-Border IncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionIncident involving cross-border or multiple jurisdictionsLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9016,28 +13601,25 @@

    Cryptojacking

    - + - + + + + - - - - + - + - - - - + @@ -9046,7 +13628,7 @@

    Cryptojacking

    - @@ -9055,43 +13637,44 @@

    Cryptojacking

    - - - -
    -

    Damage

    +
    +

    Extremely Low Likelihood

    TermCryptojackingExtremelyHighSeverity Prefix risk
    LabelCryptojackingExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CryptojackingLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Threat Landscape 2021
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9100,9 +13683,12 @@

    Damage

    - + - + + + + @@ -9113,12 +13699,9 @@

    Damage

    - + - - - - + @@ -9127,7 +13710,7 @@

    Damage

    - @@ -9136,44 +13719,44 @@

    Damage

    - - - -
    -

    Data Aggregation Bias

    +
    +

    Extremely Low Risk

    TermDamageExtremelyLowLikelihood Prefix risk
    LabelDamageExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes DamageLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9182,34 +13765,34 @@

    Data Aggregation Bias

    - + - + + + + - - - - + - + - + - @@ -9218,43 +13801,44 @@

    Data Aggregation Bias

    - - - -
    -

    Data Bias

    +
    +

    Extremely Low Severity

    TermDataAggregationBiasExtremelyLowRisk Prefix risk
    LabelData Aggregation BiasExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9263,34 +13847,34 @@

    Data Bias

    - + - + + + + - - - - + - + - + - @@ -9302,39 +13886,35 @@

    Data Bias

    - - - -
    -

    Data Breach

    +
    +

    Financial Impact

    TermDataBiasExtremelyLowSeverity Prefix risk
    LabelData BiasExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -9348,40 +13928,28 @@

    Data Breach

    - + - - - - - - - + - + - - - - - - - - + + - @@ -9393,36 +13961,36 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Financial Loss

    TermDataBreachFinancialImpact Prefix risk
    LabelData BreachFinancial Impact
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Data BreachThings that cause or have the potential to impact financial resources
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9436,12 +14004,9 @@

    Data Corruption

    - + - - - - + @@ -9481,37 +14046,35 @@

    Data Corruption

    -
    -

    Data Processing Bias

    +
    +

    Floods

    TermDataCorruptionFinancialLoss Prefix risk
    LabelData CorruptionFinancial Loss
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialImpact + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Corruption of DataConcept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    - + - + - + - + - @@ -9524,29 +14087,23 @@

    Data Processing Bias

    - + - - - - + - + - - - - + @@ -9559,44 +14116,47 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + + + + + +
    +

    Fraud

    TermDataProcessingBiasFloods Prefix risk
    LabelData Processing BiasFloods
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#Floods
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasThe occurence or potential occurence of floods
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9605,28 +14165,37 @@

    Deliberate Incident

    - + - + + + + - + - - + + + + + + + + - @@ -9638,36 +14207,37 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    Gender Discrimination

    TermDeliberateIncidentFraud Prefix risk
    LabelDeliberate IncidentFraud
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to deliberate actions of a humanConcept representing Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9681,32 +14251,23 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + @@ -9720,47 +14281,44 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    + + + +
    +

    Geographic Discrimination

    TermDenialServiceAttackGenderDiscrimination Prefix risk
    LabelDenial of Service Attack (DoS)Gender Discrimination
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Discrimination based on a person's gender identity or gender expression
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9769,7 +14327,7 @@

    Detection Control

    - + @@ -9782,7 +14340,7 @@

    Detection Control

    - + @@ -9790,7 +14348,7 @@

    Detection Control

    - @@ -9801,35 +14359,38 @@

    Detection Control

    -
    -

    Detriment

    + +
    +

    Group Attribution Bias

    TermDetectionControlGeographicDiscrimination Prefix risk
    LabelDetection ControlGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to detect eventDiscrimination based on a person's geographical origin or residence
    Date Created2024-05-192024-09-30
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9843,28 +14404,28 @@

    Detriment

    - + - + + + + - + - - - - + - + @@ -9882,40 +14443,35 @@

    Detriment

    -
    -

    Direct Discrimination

    +
    +

    Societal Risk

    TermDetrimentGroupAttributionBias Prefix risk
    LabelDetrimentGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes DetrimentBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -9929,7 +14485,7 @@

    Direct Discrimination

    - + @@ -9940,10 +14496,7 @@

    Direct Discrimination

    - - - - + @@ -9959,48 +14512,48 @@

    Direct Discrimination

    - - - -
    -

    Disability Discrimination

    +
    +

    Halt Source

    TermDirectDiscriminationGroupRisk Prefix risk
    LabelDirect DiscriminationSocietal Risk
    IRIhttps://w3id.org/dpv/risk#DirectDiscriminationhttps://w3id.org/dpv/risk#GroupRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)Risks and issues that affect or have the potential to affect groups in society
    Date Created2024-09-30
    - + - + - + - + - - - - + + + + @@ -10009,7 +14562,7 @@

    Disability Discrimination

    - + @@ -10022,15 +14575,18 @@

    Disability Discrimination

    - + - + + + + - @@ -10042,39 +14598,37 @@

    Disability Discrimination

    - -
    -

    Discrimination

    +
    +

    Harassment

    TermDisabilityDiscriminationHaltSource Prefix risk
    LabelDisability DiscriminationHalt Source
    IRIhttps://w3id.org/dpv/risk#DisabilityDiscriminationhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on physical or mental disabilitiesControl that halts the risk source or prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10086,10 +14640,7 @@

    Discrimination

    - - - - + @@ -10099,18 +14650,9 @@

    Discrimination

    - - - - - - - - - - - - + + + @@ -10127,37 +14669,36 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Harm

    TermDiscriminationHarassment Prefix risk
    LabelDiscriminationHarassment
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept -
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Definition[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2024-09-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    - + - + - + - + - @@ -10171,23 +14712,23 @@

    Distributed Denial of Service Attack (DDoS)

    - + - + + + + - - - - + - + @@ -10209,42 +14750,61 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    + + + + + + + + + + + +
    +

    High Likelihood

    TermDistributedDenialServiceAttackHarm Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Harm
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DenialServiceAttack - → risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Concept representing Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-13
    Date Modified
    - + - + - + - + - + + + + - @@ -10255,9 +14815,12 @@

    Environmental Incident

    - + - + + + + @@ -10268,15 +14831,18 @@

    Environmental Incident

    - + - + + + + - @@ -10285,42 +14851,52 @@

    Environmental Incident

    - - - -
    -

    Environmental Risk

    +
    +

    High Risk

    TermEnvironmentalIncidentHighLikelihood Prefix risk
    LabelEnvironmental IncidentHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to environmental factors outside human controlsLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10329,9 +14905,12 @@

    Environmental Risk

    - + - + + + + @@ -10340,14 +14919,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -10356,44 +14941,52 @@

    Environmental Risk

    - - - - -
    -

    Equipment Failure

    +
    +

    High Severity

    TermEnvironmentalRiskHighRisk Prefix risk
    LabelEnvironmental RiskHigh Risk
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10402,31 +14995,25 @@

    Equipment Failure

    - + - + - - - - + - + - - - - + @@ -10435,7 +15022,7 @@

    Equipment Failure

    - @@ -10447,36 +15034,37 @@

    Equipment Failure

    - -
    -

    Equipment Malfunction

    +
    +

    Homophobia

    TermEquipmentFailureHighSeverity Prefix risk
    LabelEquipment FailureHigh Severity
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Equipment FailureLevel where Severity is High
    Usage NoteHere equipment refers to physical equipmentThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -10490,35 +15078,23 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - - - - - + + @@ -10535,23 +15111,23 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Human Errors

    TermEquipmentMalfunctionHomophobia Prefix risk
    LabelEquipment MalfunctionHomophobia
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Equipment MalfunctionHostility or prejudice against individuals who are or are perceived to be homosexual
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -10564,6 +15140,7 @@

    Erroneous System Use

    @@ -10577,7 +15154,7 @@

    Erroneous System Use

    - + @@ -10586,7 +15163,7 @@

    Erroneous System Use

    - + @@ -10616,50 +15193,47 @@

    Erroneous System Use

    - - - -
    -

    Ethnic Discrimination

    +
    +

    Identification Control

    TermErroneousSystemUseHumanErrors Prefix risk
    LabelErroneous System UseHuman Errors
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#HumanErrors
    Broader/Parent types risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Erroneous System UseConcept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - - - - + + + + @@ -10668,7 +15242,7 @@

    Ethnic Discrimination

    - + @@ -10681,7 +15255,7 @@

    Ethnic Discrimination

    - + @@ -10689,7 +15263,7 @@

    Ethnic Discrimination

    - @@ -10701,40 +15275,38 @@

    Ethnic Discrimination

    -
    -

    Excellence Discrimination

    + +
    +

    Identity Fraud

    TermEthnicDiscriminationIdentificationControl Prefix risk
    LabelEthnic DiscriminationIdentification Control
    IRIhttps://w3id.org/dpv/risk#EthnicDiscriminationhttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on their ethnicity or cultural heritageControl to identify characteristics of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10748,23 +15320,32 @@

    Excellence Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -10782,36 +15363,37 @@

    Excellence Discrimination

    - -
    -

    Exposure to Harmful Speech

    +
    +

    Identity Theft

    TermExcellenceDiscriminationIdentityFraud Prefix risk
    LabelExcellence DiscriminationIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#ExcellenceDiscriminationhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of othersConcept representing Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -10825,19 +15407,16 @@

    Exposure to Harmful Speech

    - + - - - - + - + @@ -10868,35 +15447,39 @@

    Exposure to Harmful Speech

    -
    -

    External Security Threat

    + + +
    +

    Identity Verification Failure

    TermExposureToHarmfulSpeechIdentityTheft Prefix risk
    LabelExposure to Harmful SpeechIdentity Theft
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Harmful SpeechConcept representing Identity Theft
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - + - + - + - + - @@ -10909,7 +15492,7 @@

    External Security Threat

    - + @@ -10920,7 +15503,10 @@

    External Security Threat

    - + + + + @@ -10938,38 +15524,36 @@

    External Security Threat

    - - -
    -

    Extorsion

    +
    +

    Illegal Data Processing

    TermExternalSecurityThreatIdentityVerificationFailure Prefix risk
    LabelExternal Security ThreatIdentity Verification Failure
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IdentityVerificationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcepts associated with security threats that are likely to originate externallyConcept representing failure to verify identity
    Date Created2024-10-21
    - + - + - + - + - @@ -10983,16 +15567,19 @@

    Extorsion

    - + - + + + + - + @@ -11022,42 +15609,45 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Impact Control

    TermExtorsionIllegalDataProcessing Prefix risk
    LabelExtorsionIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ExtorsionConcept representing Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    - + - + - + - + - - @@ -11068,12 +15658,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -11084,7 +15671,7 @@

    Extremely High Likelihood

    - + @@ -11095,7 +15682,7 @@

    Extremely High Likelihood

    - @@ -11104,126 +15691,45 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    -
    TermExtremelyHighLikelihoodImpactControl Prefix risk
    LabelExtremely High LikelihoodImpact Control
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is Extremely HighRisk Mitigation Measure that controls Impacts
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighRiskPrefixrisk
    LabelExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Extremely High Severity

    +
    +

    Implicit Bias

    - + - + - + - + - - - - - + @@ -11232,34 +15738,34 @@

    Extremely High Severity

    - + - - - - + - + + + + - + - + - @@ -11268,44 +15774,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    + + + +
    +

    Inability to Enter Into Contract

    TermExtremelyHighSeverityImplicitBias Prefix risk
    LabelExtremely High SeverityImplicit Bias
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighBias that occurs when a human makes an association or assumption based on their mental models and memories
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11314,12 +15820,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -11330,18 +15833,15 @@

    Extremely Low Likelihood

    - + - - - - + - @@ -11350,44 +15850,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    + + + +
    +

    Inability to Establish Legal Claims

    TermExtremelyLowLikelihoodInabilityToEnterIntoContract Prefix risk
    LabelExtremely Low LikelihoodInability to Enter Into Contract
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#InabilityToEnterIntoContract
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11396,12 +15896,9 @@

    Extremely Low Risk

    - + - - - - + @@ -11412,18 +15909,15 @@

    Extremely Low Risk

    - + - - - - + - @@ -11432,44 +15926,44 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    + + + +
    +

    Inability to Fulfill Legal Obligations

    TermExtremelyLowRiskInabilityToEstablishLegalClaims Prefix risk
    LabelExtremely Low RiskInability to Establish Legal Claims
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#InabilityToEstablishLegalClaims
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11478,12 +15972,9 @@

    Extremely Low Severity

    - + - - - - + @@ -11494,18 +15985,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -11517,23 +16005,23 @@

    Extremely Low Severity

    -
    -

    Financial Impact

    +
    +

    Inability to Process Payments

    TermExtremelyLowSeverityInabilityToFulfillLegalObligations Prefix risk
    LabelExtremely Low SeverityInability to Fulfill Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#InabilityToFulfillLegalObligations
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -11545,7 +16033,9 @@

    Financial Impact

    - @@ -11558,7 +16048,7 @@

    Financial Impact

    - + @@ -11569,7 +16059,10 @@

    Financial Impact

    - + + + + @@ -11588,23 +16081,23 @@

    Financial Impact

    -
    -

    Financial Loss

    +
    +

    Inability to Protect Vital Interests

    TermFinancialImpactInabilityToProcessPayments Prefix risk
    LabelFinancial ImpactInability to Process Payments
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#InabilityToProcessPayments
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesStub
    Date Created2024-10-21
    - + - + - + @@ -11616,7 +16109,8 @@

    Financial Loss

    - @@ -11630,32 +16124,23 @@

    Financial Loss

    - + - - - - + - + - - - - - - - - + + @@ -11672,37 +16157,36 @@

    Financial Loss

    - -
    -

    Fraud

    +
    +

    Inability to Provide Health Care

    TermFinancialLossInabilityToProtectVitalInterests Prefix risk
    LabelFinancial LossInability to Protect Vital Interests
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#InabilityToProtectVitalInterests
    Broader/Parent types risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -11716,32 +16200,23 @@

    Fraud

    - + - - - - + - + - - - - - - - - + + @@ -11754,51 +16229,43 @@

    Fraud

    - - - - -
    -

    Gender Discrimination

    +
    +

    Incident

    TermFraudInabilityToProvideHealthCare Prefix risk
    LabelFraudInability to Provide Health Care
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#InabilityToProvideHealthCare
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes FraudStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -11807,10 +16274,16 @@

    Gender Discrimination

    - + + + + + - + + + @@ -11820,65 +16293,73 @@

    Gender Discrimination

    - + - - + + + + + + + + -
    TermGenderDiscriminationIncident Prefix risk
    LabelGender DiscriminationIncident
    IRIhttps://w3id.org/dpv/risk#GenderDiscriminationhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionDiscrimination based on a person's gender identity or gender expressionAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-09-302024-02-14
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-TAXONOMY in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - - - - -
    -

    Geographic Discrimination

    +
    +

    Incident Assessment Report

    - + - + - + - + - - - - + + + + @@ -11887,7 +16368,7 @@

    Geographic Discrimination

    - + @@ -11900,7 +16381,7 @@

    Geographic Discrimination

    - + @@ -11908,7 +16389,7 @@

    Geographic Discrimination

    - @@ -11917,44 +16398,46 @@

    Geographic Discrimination

    - - - -
    -

    Group Attribution Bias

    +
    +

    Incident Concluded

    TermGeographicDiscriminationIncidentAssessmentReport Prefix risk
    LabelGeographic DiscriminationIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#GeographicDiscriminationhttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionDiscrimination based on a person's geographical origin or residenceA report describing the assessment of an incident in terms of its effects or impacts
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -11963,34 +16446,31 @@

    Group Attribution Bias

    - + - - - - + - + - + - @@ -11998,47 +16478,46 @@

    Group Attribution Bias

    - -
    -

    Halt Source

    +
    +

    Incident Concluding Report

    TermGroupAttributionBiasIncidentConcluded Prefix risk
    LabelGroup Attribution BiasIncident Concluded
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -12049,7 +16528,7 @@

    Halt Source

    - + @@ -12065,15 +16544,12 @@

    Halt Source

    - - - - + - @@ -12081,51 +16557,58 @@

    Halt Source

    - - - - -
    -

    Harassment

    +
    +

    Incident Detection Report

    TermHaltSourceIncidentConcludingReport Prefix risk
    LabelHalt SourceIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl that halts the risk source or prevents it from materialisingA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + - + + + + @@ -12135,14 +16618,17 @@

    Harassment

    - + + + + - @@ -12151,42 +16637,46 @@

    Harassment

    - - - -
    -

    Harm

    +
    +

    Incident Halted

    TermHarassmentIncidentDetectionReport Prefix risk
    LabelHarassmentIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#Harassmenthttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionA report describing the detection of a Incident
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12195,12 +16685,9 @@

    Harm

    - + - - - - + @@ -12211,12 +16698,9 @@

    Harm

    - + - - - - + @@ -12225,7 +16709,7 @@

    Harm

    - @@ -12233,61 +16717,46 @@

    Harm

    - - - - - - - - - - - -
    -

    High Likelihood

    +
    +

    Incident Handling Report

    TermHarmIncidentHalted Prefix risk
    LabelHarmIncident Halted
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IndividualRisk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harm to humansThe incident has halted or paused with a high likelihood of resuming or recurring
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2022-08-132024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - @@ -12298,12 +16767,9 @@

    High Likelihood

    - + - - - - + @@ -12314,18 +16780,15 @@

    High Likelihood

    - + - - - - + - @@ -12333,53 +16796,36 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Incident Identifier

    TermHighLikelihoodIncidentHandlingReport Prefix risk
    LabelHigh LikelihoodIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is HighA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - + - - - - + @@ -12388,12 +16834,9 @@

    High Risk

    - + - - - - + @@ -12404,18 +16847,15 @@

    High Risk

    - + - - - - + - @@ -12423,51 +16863,49 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Incident Impact Assessment

    TermHighRiskIncidentIdentifier Prefix risk
    LabelHigh RiskIncident Identifier
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIdentifier associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - @@ -12478,12 +16916,9 @@

    High Severity

    - + - - - - + @@ -12494,7 +16929,7 @@

    High Severity

    - + @@ -12505,7 +16940,7 @@

    High Severity

    - @@ -12514,50 +16949,46 @@

    High Severity

    - - - -
    -

    Homophobia

    +
    +

    Incident Mitigated

    TermHighSeverityIncidentImpactAssessment Prefix risk
    LabelHigh SeverityIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is HighAn impact assessment associated with a incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -12566,7 +16997,7 @@

    Homophobia

    - + @@ -12579,15 +17010,18 @@

    Homophobia

    - + - + + + + - @@ -12595,44 +17029,45 @@

    Homophobia

    - - - - -
    -

    Human Errors

    +
    +

    Incident Mitigation Measure

    TermHomophobiaIncidentMitigated Prefix risk
    LabelHomophobiaIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#Homophobiahttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionHostility or prejudice against individuals who are or are perceived to be homosexualThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-09-302024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12641,37 +17076,28 @@

    Human Errors

    - + - - - - + - + - - - - - - - - + + - @@ -12680,45 +17106,44 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Incident Near Miss

    TermHumanErrorsIncidentMitigationMeasure Prefix risk
    LabelHuman ErrorsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Human ErrorsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -12729,7 +17154,7 @@

    Identification Control

    - + @@ -12742,15 +17167,18 @@

    Identification Control

    - + - + + + + - @@ -12758,46 +17186,47 @@

    Identification Control

    - - - - - -
    -

    Identity Fraud

    +
    +

    Incident Notice

    TermIdentificationControlIncidentNearMiss Prefix risk
    LabelIdentification ControlIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasContext, + dpv:hasStatus
    DefinitionControl to identify characteristics of eventThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12806,37 +17235,28 @@

    Identity Fraud

    - + - - - - + - + - - - - - - - - + + - @@ -12845,45 +17265,46 @@

    Identity Fraud

    - - - - -
    -

    Identity Theft

    +
    +

    Incident Ongoing

    TermIdentityFraudIncidentNotice Prefix risk
    LabelIdentity FraudIncident Notice
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Identity FraudNotice associated with an Incident
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12892,28 +17313,22 @@

    Identity Theft

    - + - - - - + - + - - - - + @@ -12922,7 +17337,7 @@

    Identity Theft

    - @@ -12930,43 +17345,48 @@

    Identity Theft

    - - - -
    -

    Illegal Data Processing

    +
    +

    Incident Ongoing Report

    TermIdentityTheftIncidentOngoing Prefix risk
    LabelIdentity TheftIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Identity TheftThe incident is ongoing i.e. still active
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12975,40 +17395,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -13016,46 +17424,46 @@

    Illegal Data Processing

    - -
    -

    Impact Control

    +
    +

    Incident Preliminary Report

    TermIllegalDataProcessingIncidentOngoingReport Prefix risk
    LabelIllegal Data ProcessingIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Illegal Processing of DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -13066,7 +17474,7 @@

    Impact Control

    - + @@ -13082,15 +17490,12 @@

    Impact Control

    - - - - + - @@ -13098,45 +17503,47 @@

    Impact Control

    - - - - -
    -

    Implicit Bias

    +
    +

    Incident Register

    TermImpactControlIncidentPreliminaryReport Prefix risk
    LabelImpact ControlIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that controls ImpactsA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -13145,34 +17552,31 @@

    Implicit Bias

    - + - - - - + - + - + - @@ -13180,23 +17584,23 @@

    Implicit Bias

    -
    -

    Incident

    +
    +

    Incident Report

    TermImplicitBiasIncidentRegister Prefix risk
    LabelImplicit BiasIncident Register
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesA register recording incidentes, their reports, notifications, and other related activities
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + @@ -13208,13 +17612,17 @@

    Incident

    - - @@ -13225,16 +17633,10 @@

    Incident

    - + - - - - - - - + @@ -13246,46 +17648,37 @@

    Incident

    - - - - - - - - + + -
    TermIncidentIncidentReport Prefix risk
    LabelIncidentIncident Report
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentReport
    Broader/Parent types dpv:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionAn actual or occured eventDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-05-19
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT in RISK
    - - -
    -

    Incident Assessment Report

    +
    +

    Incident Status

    - + - + - + @@ -13297,18 +17690,15 @@

    Incident Assessment Report

    - - @@ -13319,10 +17709,13 @@

    Incident Assessment Report

    - + + + + @@ -13332,15 +17725,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -13349,23 +17745,23 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Incident Status Unknown

    TermIncidentAssessmentReportIncidentStatus Prefix risk
    LabelIncident Assessment ReportIncident Status
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
    - + - + - + @@ -13397,7 +17793,7 @@

    Incident Concluded

    - + @@ -13429,46 +17825,45 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Incident Suspected

    TermIncidentConcludedIncidentStatusUnknown Prefix risk
    LabelIncident ConcludedIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe status of a incident is unknown
    - + - + - + - + - - @@ -13479,7 +17874,7 @@

    Incident Concluding Report

    - + @@ -13492,15 +17887,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -13508,23 +17906,23 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    +
    +

    Incident Suspected Report

    TermIncidentConcludingReportIncidentSuspected Prefix risk
    LabelIncident Concluding ReportIncident Suspected
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13558,7 +17956,7 @@

    Incident Detection Report

    - + @@ -13588,23 +17986,23 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Incident Terminated

    TermIncidentDetectionReportIncidentSuspectedReport Prefix risk
    LabelIncident Detection ReportIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentSuspectedReport
    DefinitionA report describing the detection of a IncidentA report describing the suspicion of an incident in the past or occuring
    - + - + - + @@ -13636,7 +18034,7 @@

    Incident Halted

    - + @@ -13668,48 +18066,45 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + + + + +
    +

    Indirect Discrimination

    TermIncidentHaltedIncidentTerminated Prefix risk
    LabelIncident HaltedIncident Terminated
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentTerminated
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + @@ -13718,7 +18113,7 @@

    Incident Handling Report

    - + @@ -13731,7 +18126,7 @@

    Incident Handling Report

    - + @@ -13739,7 +18134,7 @@

    Incident Handling Report

    - @@ -13747,33 +18142,42 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + + + + +
    +

    Individual Health & Safety

    TermIncidentHandlingReportIndirectDiscrimination Prefix risk
    LabelIncident Handling ReportIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + @@ -13783,10 +18187,7 @@

    Incident Identifier

    - - - - + @@ -13796,17 +18197,14 @@

    Incident Identifier

    - - - - + - @@ -13814,51 +18212,44 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + + + + +
    +

    Individual Risk

    TermIncidentIdentifierIndividualHealthSafety Prefix risk
    LabelIncident IdentifierIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13867,7 +18258,7 @@

    Incident Impact Assessment

    - + @@ -13878,20 +18269,14 @@

    Incident Impact Assessment

    - - - - + - - - - + - @@ -13900,46 +18285,42 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Informativeness Bias

    TermIncidentImpactAssessmentIndividualRisk Prefix risk
    LabelIncident Impact AssessmentIndividual Risk
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentRisks and issues that affect or have the potential to affect specific individuals
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13948,31 +18329,34 @@

    Incident Mitigated

    - + - + + + + - + - + - @@ -13980,45 +18364,46 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + +
    +

    In-Group Bias

    TermIncidentMitigatedInformativenessBias Prefix risk
    LabelIncident MitigatedInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:EngineeringDecisionBias
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    Source
    Date Created2024-02-142024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14027,28 +18412,34 @@

    Incident Mitigation Measure

    - + - + + + + - + - + + + + - @@ -14057,46 +18448,45 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + +
    +

    Injury

    TermIncidentMitigationMeasureInGroupBias Prefix risk
    LabelIncident Mitigation MeasureIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14105,22 +18495,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -14129,7 +18525,7 @@

    Incident Near Miss

    - @@ -14137,57 +18533,55 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + + +
    +

    None

    TermIncidentNearMissInjury Prefix risk
    LabelIncident Near MissInjury
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Concept representing Injury
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + - - - - + @@ -14197,17 +18591,14 @@

    Incident Notice

    - - - - + - @@ -14215,47 +18606,39 @@

    Incident Notice

    - -
    -

    Incident Ongoing

    +
    +

    Integrity Concept

    TermIncidentNoticeIntegrityBreach Prefix risk
    LabelIncident NoticeNone
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an Incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14264,9 +18647,12 @@

    Incident Ongoing

    - + - + + + + @@ -14277,7 +18663,7 @@

    Incident Ongoing

    - + @@ -14288,7 +18674,7 @@

    Incident Ongoing

    - @@ -14296,23 +18682,23 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    +
    +

    Integrity Incident

    TermIncidentOngoingIntegrityConcept Prefix risk
    LabelIncident OngoingIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-02-142024-09-29
    See More: section INCIDENT-STATUS in RISK + section CORE in RISK
    - + - + - + @@ -14324,18 +18710,14 @@

    Incident Ongoing Report

    - - @@ -14346,7 +18728,7 @@

    Incident Ongoing Report

    - + @@ -14375,48 +18757,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Intentional Misuse

    TermIncidentOngoingReportIntegrityIncident Prefix risk
    LabelIncident Ongoing ReportIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#IntegrityIncident
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + risk:hasIncident
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedIncident where the integrity of information or system has been affected
    - + - + - + - + - - - - - + @@ -14425,7 +18805,7 @@

    Incident Preliminary Report

    - + @@ -14436,17 +18816,14 @@

    Incident Preliminary Report

    - - - - + - @@ -14454,47 +18831,47 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + + + + + +
    +

    Intercept Communications

    TermIncidentPreliminaryReportIntentionalMisuse Prefix risk
    LabelIncident Preliminary ReportIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownConcept represent an intentional misuse (of something)
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14503,22 +18880,31 @@

    Incident Register

    - + - + + + + - + + + + - + - + + + + @@ -14527,7 +18913,7 @@

    Incident Register

    - @@ -14535,47 +18921,50 @@

    Incident Register

    -
    -

    Incident Report

    + + + + + + + + +
    +

    Judicial Costs

    TermIncidentRegisterInterceptCommunications Prefix risk
    LabelIncident RegisterIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesConcept representing Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14584,7 +18973,7 @@

    Incident Report

    - + @@ -14595,17 +18984,14 @@

    Incident Report

    - - - - + - @@ -14613,45 +18999,46 @@

    Incident Report

    -
    -

    Incident Status

    + + + + +
    +

    Judicial Penalty

    TermIncidentReportJudicialCosts Prefix risk
    LabelIncident ReportJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that involves or causes judicial costs to be paid
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14660,13 +19047,10 @@

    Incident Status

    - + - - - @@ -14674,20 +19058,14 @@

    Incident Status

    - - - - + - - - - + - @@ -14696,46 +19074,44 @@

    Incident Status

    -
    -

    Incident Status Unknown

    + + + +
    +

    Language Discrimination

    TermIncidentStatusJudicialPenalty Prefix risk
    LabelIncident StatusJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Status - → dpv:Context + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that involves or causes judicial penalties to be paid
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14744,7 +19120,7 @@

    Incident Status Unknown

    - + @@ -14757,18 +19133,15 @@

    Incident Status Unknown

    - + - - - - + - @@ -14777,46 +19150,42 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    + + +
    +

    Legal Compliance Risk

    TermIncidentStatusUnknownLanguageDiscrimination Prefix risk
    LabelIncident Status UnknownLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe status of a incident is unknownDiscrimination based on a person's language, often linked to national origin or ethnicity
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14825,7 +19194,7 @@

    Incident Suspected

    - + @@ -14836,20 +19205,14 @@

    Incident Suspected

    - - - - + - - - - + - @@ -14857,48 +19220,44 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + + + + +
    +

    Legally Relevant Consequence

    TermIncidentSuspectedLegalComplianceRisk Prefix risk
    LabelIncident SuspectedLegal Compliance Risk
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#LegalComplianceRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisks and consequences regarding legal compliance and its violation
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14907,7 +19266,7 @@

    Incident Suspected Report

    - + @@ -14918,17 +19277,14 @@

    Incident Suspected Report

    - - - - + - @@ -14937,46 +19293,43 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    + + + + +
    +

    Legal Risk Concept

    TermIncidentSuspectedReportLegallyRelevantConsequence Prefix risk
    LabelIncident Suspected ReportLegally Relevant Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#LegallyRelevantConsequence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the suspicion of an incident in the past or occuringA consequence that is legally relevant i.e. actionable under law
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14985,9 +19338,12 @@

    Incident Terminated

    - + - + + + + @@ -14998,18 +19354,15 @@

    Incident Terminated

    - + - - - - + - @@ -15021,40 +19374,36 @@

    Incident Terminated

    -
    -

    Indirect Discrimination

    +
    +

    Legal Support Limited

    TermIncidentTerminatedLegalRiskConcept Prefix risk
    LabelIncident TerminatedLegal Risk Concept
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#LegalRiskConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringRisk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process
    Usage NoteLegal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -15068,7 +19417,7 @@

    Indirect Discrimination

    - + @@ -15081,7 +19430,7 @@

    Indirect Discrimination

    - + @@ -15101,23 +19450,23 @@

    Indirect Discrimination

    -
    -

    Individual Health & Safety

    +
    +

    Lose of Credibility

    TermIndirectDiscriminationLegalSupportLimited Prefix risk
    LabelIndirect DiscriminationLegal Support Limited
    IRIhttps://w3id.org/dpv/risk#IndirectDiscriminationhttps://w3id.org/dpv/risk#LegalSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justifiedStub
    Date Created2024-09-302024-10-21
    - + - + - + @@ -15129,7 +19478,9 @@

    Individual Health & Safety

    - @@ -15140,19 +19491,34 @@

    Individual Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15168,33 +19534,39 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Lose of Customer Confidence

    TermIndividualHealthSafetyLoseCredibility Prefix risk
    LabelIndividual Health & SafetyLose of Credibility
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LoseCredibility
    Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcept representing Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - + + + @@ -15206,20 +19578,32 @@

    Individual Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -15236,35 +19620,37 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Lose of Goodwill

    TermIndividualRiskLoseCustomerConfidence Prefix risk
    LabelIndividual RiskLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsConcept representing Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15277,7 +19663,7 @@

    Informativeness Bias

    - + @@ -15286,19 +19672,22 @@

    Informativeness Bias

    - + - + - + + + + - + @@ -15316,37 +19705,37 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    +
    +

    Lose of Negotiating Capacity

    TermInformativenessBiasLoseGoodwill Prefix risk
    LabelInformativeness BiasLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:EngineeringDecisionBias + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupConcept representing Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - @@ -15359,7 +19748,7 @@

    In-Group Bias

    - + @@ -15368,19 +19757,22 @@

    In-Group Bias

    - + - + - + + + + - + @@ -15398,23 +19790,23 @@

    In-Group Bias

    -
    -

    Injury

    +
    +

    Lose of Opportunity

    TermInGroupBiasLoseNegotiatingCapacity Prefix risk
    LabelIn-Group BiasLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsConcept representing Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + @@ -15426,8 +19818,9 @@

    Injury

    - @@ -15440,7 +19833,7 @@

    Injury

    - + @@ -15482,38 +19875,36 @@

    Injury

    - -
    -

    None

    +
    +

    Lose of Reputation

    TermInjuryLoseOpportunity Prefix risk
    LabelInjuryLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseOpportunity
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjuryConcept representing Loss of Opportunity
    - + - + - + - + - @@ -15525,19 +19916,34 @@

    None

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15550,35 +19956,41 @@

    None

    -
    -

    Integrity Concept

    + + + + +
    +

    Lose of Trust

    TermIntegrityBreachLoseReputation Prefix risk
    LabelNoneLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionConcept representing Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15591,25 +20003,28 @@

    Integrity Concept

    - + - - - - + - + + + + - + - + + + + @@ -15618,7 +20033,7 @@

    Integrity Concept

    - @@ -15626,42 +20041,51 @@

    Integrity Concept

    -
    -

    Integrity Incident

    + +
    +

    Low Likelihood

    TermIntegrityConceptLoseTrust Prefix risk
    LabelIntegrity ConceptLose of Trust
    IRIhttps://w3id.org/dpv/risk#IntegrityConcepthttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Integrity' in CIA InfoSec modelConcept representing Loss of Trust
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -15672,9 +20096,12 @@

    Integrity Incident

    - + - + + + + @@ -15685,15 +20112,18 @@

    Integrity Incident

    - + - + + + + - @@ -15702,44 +20132,52 @@

    Integrity Incident

    - - - -
    -

    Intentional Misuse

    +
    +

    Low Risk

    TermIntegrityIncidentLowLikelihood Prefix risk
    LabelIntegrity IncidentLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident where the integrity of information or system has been affectedLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15748,9 +20186,12 @@

    Intentional Misuse

    - + - + + + + @@ -15759,14 +20200,20 @@

    Intentional Misuse

    - + + + + - + + + + - @@ -15775,45 +20222,52 @@

    Intentional Misuse

    - - - - -
    -

    Intercept Communications

    +
    +

    Low Severity

    TermIntentionalMisuseLowRisk Prefix risk
    LabelIntentional MisuseLow Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Misuse - → risk:UserRisks - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionIntentional MisuseLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15822,31 +20276,25 @@

    Intercept Communications

    - + - + - - - - + - + - - - - + @@ -15855,7 +20303,7 @@

    Intercept Communications

    - @@ -15867,27 +20315,23 @@

    Intercept Communications

    - - - - -
    -

    Judicial Costs

    +
    +

    Loyalty Program Exclusion

    TermInterceptCommunicationsLowSeverity Prefix risk
    LabelIntercept CommunicationsLow Severity
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Interception of CommunicationsLevel where Severity is Low
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + @@ -15899,8 +20343,8 @@

    Judicial Costs

    - @@ -15914,7 +20358,7 @@

    Judicial Costs

    - + @@ -15925,7 +20369,10 @@

    Judicial Costs

    - + + + + @@ -15944,36 +20391,36 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    +
    +

    Malicious Activity

    TermJudicialCostsLoyaltyProgramExclusion Prefix risk
    LabelJudicial CostsLoyalty Program Exclusion
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoyaltyProgramExclusion
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidStub
    Date Created2024-10-21
    - + - + - + - + - @@ -15987,7 +20434,7 @@

    Judicial Penalty

    - + @@ -16017,40 +20464,39 @@

    Judicial Penalty

    -
    -

    Language Discrimination

    + + +
    +

    Malicious Code Attack

    TermJudicialPenaltyMaliciousActivity Prefix risk
    LabelJudicial PenaltyMalicious Activity
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    - + - + - + - + - - - @@ -16064,23 +20510,32 @@

    Language Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -16096,35 +20551,41 @@

    Language Discrimination

    -
    -

    Legal Risk

    + + + +
    +

    Malware Attack

    TermLanguageDiscriminationMaliciousCodeAttack Prefix risk
    LabelLanguage DiscriminationMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#LanguageDiscriminationhttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's language, often linked to national origin or ethnicityConcept representing Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16137,20 +20598,32 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -16167,23 +20640,23 @@

    Legal Risk

    -
    -

    Lose of Credibility

    +
    +

    Material Damage

    TermLegalRiskMalwareAttack Prefix risk
    LabelLegal RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementConcept representing Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -16195,7 +20668,8 @@

    Lose of Credibility

    - @@ -16209,23 +20683,23 @@

    Lose of Credibility

    - + - + + + + - - - - + - + @@ -16251,35 +20725,37 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    +
    +

    Misandry

    TermLoseCredibilityMaterialDamage Prefix risk
    LabelLose of CredibilityMaterial Damage
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#MaterialDamage
    Broader/Parent types risk:ReputationalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of CredibilityConcept representing Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -16293,32 +20769,23 @@

    Lose of Customer Confidence

    - + - - - - + - + - - - - - - - - + + @@ -16335,35 +20802,37 @@

    Lose of Customer Confidence

    -
    -

    Lose of Goodwill

    +
    +

    Misogyny

    TermLoseCustomerConfidenceMisandry Prefix risk
    LabelLose of Customer ConfidenceMisandry
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Customer ConfidenceDislike, contempt, or prejudice against men
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16377,32 +20846,23 @@

    Lose of Goodwill

    - + - - - - + - + - - - - - - - - + + @@ -16419,35 +20879,36 @@

    Lose of Goodwill

    -
    -

    Lose of Negotiating Capacity

    +
    +

    Misuse

    TermLoseGoodwillMisogyny Prefix risk
    LabelLose of GoodwillMisogyny
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillDislike, contempt, or prejudice against women
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16461,23 +20922,20 @@

    Lose of Negotiating Capacity

    - + - - - - + - + @@ -16485,7 +20943,7 @@

    Lose of Negotiating Capacity

    - + @@ -16500,43 +20958,52 @@

    Lose of Negotiating Capacity

    - - - -
    -

    Lose of Opportunity

    +
    +

    Moderate Likelihood

    TermLoseNegotiatingCapacityMisuse Prefix risk
    LabelLose of Negotiating CapacityMisuse
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ReputationalRisk + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityConcept representing a misuse (of something)
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-06-11
    Date Modified
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    - + - + - + - + - + + + + - + + + + @@ -16545,28 +21012,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -16575,7 +21039,7 @@

    Lose of Opportunity

    - @@ -16584,43 +21048,52 @@

    Lose of Opportunity

    - - - -
    -

    Lose of Reputation

    +
    +

    Moderate Risk

    TermLoseOpportunityModerateLikelihood Prefix risk
    LabelLose of OpportunityModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Loss of OpportunityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16629,28 +21102,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -16659,7 +21129,7 @@

    Lose of Reputation

    - @@ -16668,43 +21138,52 @@

    Lose of Reputation

    - - - -
    -

    Lose of Trust

    +
    +

    Moderate Severity

    TermLoseReputationModerateRisk Prefix risk
    LabelLose of ReputationModerate Risk
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Loss of ReputationLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16713,28 +21192,25 @@

    Lose of Trust

    - + - + + + + - - - - + - + - - - - + @@ -16743,7 +21219,7 @@

    Lose of Trust

    - @@ -16752,50 +21228,46 @@

    Lose of Trust

    -
    -

    Low Likelihood

    +
    +

    Monitor Consequence

    TermLoseTrustModerateSeverity Prefix risk
    LabelLose of TrustModerate Severity
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Loss of TrustLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - @@ -16806,12 +21278,9 @@

    Low Likelihood

    - + - - - - + @@ -16822,7 +21291,7 @@

    Low Likelihood

    - + @@ -16833,7 +21302,7 @@

    Low Likelihood

    - @@ -16842,50 +21311,45 @@

    Low Likelihood

    -
    -

    Low Risk

    +
    +

    Monitor Control

    TermLowLikelihoodMonitorConsequence Prefix risk
    LabelLow LikelihoodMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is LowControl that monitors a Risk Consequence
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16896,11 +21360,11 @@

    Low Risk

    - + - + @@ -16912,7 +21376,7 @@

    Low Risk

    - + @@ -16923,7 +21387,7 @@

    Low Risk

    - @@ -16932,50 +21396,46 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Monitor Impact

    TermLowRiskMonitorControl Prefix risk
    LabelLow RiskMonitor Control
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Risk is LowRisk Mitigation Measure that uses controls to monitor events
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16986,12 +21446,9 @@

    Low Severity

    - + - - - - + @@ -17002,7 +21459,7 @@

    Low Severity

    - + @@ -17013,7 +21470,7 @@

    Low Severity

    - @@ -17022,43 +21479,48 @@

    Low Severity

    - - - -
    -

    Malicious Activity

    +
    +

    Monitor Risk

    TermLowSeverityMonitorImpact Prefix risk
    LabelLow SeverityMonitor Impact
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Severity is LowControl that monitors a Risk Impact
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17067,7 +21529,7 @@

    Malicious Activity

    - + @@ -17078,14 +21540,20 @@

    Malicious Activity

    - + + + + - + + + + - @@ -17094,46 +21562,48 @@

    Malicious Activity

    - - - - - -
    -

    Malicious Code Attack

    +
    +

    Monitor Control

    TermMaliciousActivityMonitorRisk Prefix risk
    LabelMalicious ActivityMonitor Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousActivityhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to othersControl that monitors a Risk
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17142,28 +21612,22 @@

    Malicious Code Attack

    - + - - - - + - + - - - - + @@ -17172,7 +21636,7 @@

    Malicious Code Attack

    - @@ -17181,46 +21645,48 @@

    Malicious Code Attack

    - - - - - -
    -

    Malware Attack

    +
    +

    Monitor Risk Source

    TermMaliciousCodeAttackMonitorRiskControl Prefix risk
    LabelMalicious Code AttackMonitor Control
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors another Control
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17229,28 +21695,22 @@

    Malware Attack

    - + - - - - + - + - - - - + @@ -17259,7 +21719,7 @@

    Malware Attack

    - @@ -17268,43 +21728,48 @@

    Malware Attack

    - - - -
    -

    Material Damage

    +
    +

    Monitor Vulnerabilities

    TermMalwareAttackMonitorRiskSource Prefix risk
    LabelMalware AttackMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk Source
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17313,12 +21778,9 @@

    Material Damage

    - + - - - - + @@ -17329,12 +21791,9 @@

    Material Damage

    - + - - - - + @@ -17343,7 +21802,7 @@

    Material Damage

    - @@ -17355,23 +21814,23 @@

    Material Damage

    -
    -

    Misandry

    +
    +

    Nationality Discrimination

    TermMaterialDamageMonitorVulnerabilities Prefix risk
    LabelMaterial DamageMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that monitors a Risk Vulnerability
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -17383,14 +21842,8 @@

    Misandry

    - - - @@ -17404,7 +21857,7 @@

    Misandry

    - + @@ -17437,42 +21890,36 @@

    Misandry

    -
    -

    Misogyny

    +
    +

    Non-Material Damage

    TermMisandryNationalityDiscrimination Prefix risk
    LabelMisandryNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#Misandryhttps://w3id.org/dpv/risk#NationalityDiscrimination
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against menDiscrimination based on a person's nationality or citizenship
    - + - + - + - + - - - @@ -17486,9 +21933,12 @@

    Misogyny

    - + - + + + + @@ -17499,10 +21949,16 @@

    Misogyny

    - + - - + + + + + + + + @@ -17519,35 +21975,38 @@

    Misogyny

    -
    -

    Misuse

    +
    +

    Non-Normality Bias

    TermMisogynyNonMaterialDamage Prefix risk
    LabelMisogynyNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Misogynyhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against womenConcept representing Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-09-302022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -17561,28 +22020,28 @@

    Misuse

    - + - + + + + - + - - - - + - + @@ -17597,52 +22056,47 @@

    Misuse

    -
    -

    Moderate Likelihood

    + + + +
    +

    Non-Response Bias

    TermMisuseNonNormalityBias Prefix risk
    LabelMisuseNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:UserRisks + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes MisuseBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-06-112024-09-13
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -17651,34 +22105,34 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + - @@ -17687,52 +22141,42 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + +
    +

    Operational Security Risk

    TermModerateLikelihoodNonResponseBias Prefix risk
    LabelModerate LikelihoodNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17741,12 +22185,9 @@

    Moderate Risk

    - + - - - - + @@ -17755,20 +22196,14 @@

    Moderate Risk

    - - - - + - - - - + - @@ -17777,52 +22212,43 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + + +
    +

    Organisational Risk Concept

    TermModerateRiskOperationalSecurityRisk Prefix risk
    LabelModerate RiskOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateRisks and issues that arise during operational processes
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17831,11 +22257,11 @@

    Moderate Severity

    - + - + @@ -17847,18 +22273,15 @@

    Moderate Severity

    - + - - - - + - @@ -17867,48 +22290,45 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    + + + +
    +

    Out-Group Homogeneity Bias

    TermModerateSeverityOrganisationalRiskConcept Prefix risk
    LabelModerate SeverityOrganisational Risk Concept
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#OrganisationalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateRisk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Organisational in this context refers to an organisation which is not human but is managed by humans
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17917,31 +22337,34 @@

    Monitor Consequence

    - + - + + + + - + - + - @@ -17950,47 +22373,45 @@

    Monitor Consequence

    -
    -

    Monitor Control

    + + + +
    +

    Payment

    TermMonitorConsequenceOutGroupHomogeneityBias Prefix risk
    LabelMonitor ConsequenceOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ConsequenceBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17999,12 +22420,9 @@

    Monitor Control

    - + - - - - + @@ -18015,18 +22433,21 @@

    Monitor Control

    - + - + + + + - + - @@ -18035,48 +22456,44 @@

    Monitor Control

    -
    -

    Monitor Impact

    + + + +
    +

    Personalisation Disabled

    TermMonitorControlPayment Prefix risk
    LabelMonitor ControlPayment
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsSomething that acts as or provides payment e.g. to access a service or purchase resources
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18085,7 +22502,7 @@

    Monitor Impact

    - + @@ -18098,18 +22515,15 @@

    Monitor Impact

    - + - - - - + - @@ -18118,48 +22532,44 @@

    Monitor Impact

    -
    -

    Monitor Risk

    + + + +
    +

    Personalisation Enabled

    TermMonitorImpactPersonalisationDisabled Prefix risk
    LabelMonitor ImpactPersonalisation Disabled
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#PersonalisationDisabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18168,7 +22578,7 @@

    Monitor Risk

    - + @@ -18181,18 +22591,15 @@

    Monitor Risk

    - + - - - - + - @@ -18201,48 +22608,44 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Personal Safety Endangerment

    TermMonitorRiskPersonalisationEnabled Prefix risk
    LabelMonitor RiskPersonalisation Enabled
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#PersonalisationEnabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18251,22 +22654,28 @@

    Monitor Control

    - + - + + + + - + - + + + + @@ -18275,7 +22684,7 @@

    Monitor Control

    - @@ -18284,48 +22693,46 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + + +
    +

    Phishing Scam

    TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
    LabelMonitor ControlPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlConcept representing Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18334,22 +22741,28 @@

    Monitor Risk Source

    - + - + + + + - + - + + + + @@ -18358,7 +22771,7 @@

    Monitor Risk Source

    - @@ -18367,48 +22780,45 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Physical Assault

    TermMonitorRiskSourcePhishingScam Prefix risk
    LabelMonitor Risk SourcePhishing Scam
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceConcept representing Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18417,22 +22827,28 @@

    Monitor Vulnerabilities

    - + - + + + + - + - + + + + @@ -18441,7 +22857,7 @@

    Monitor Vulnerabilities

    - @@ -18453,40 +22869,37 @@

    Monitor Vulnerabilities

    -
    -

    Nationality Discrimination

    +
    +

    Physical Harm

    TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
    LabelMonitor VulnerabilitiesPhysical Assault
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityConcept representing Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -18498,10 +22911,7 @@

    Nationality Discrimination

    - - - - + @@ -18511,10 +22921,7 @@

    Nationality Discrimination

    - - - - + @@ -18532,36 +22939,35 @@

    Nationality Discrimination

    - -
    -

    Non-Material Damage

    +
    +

    Policy Risk

    TermNationalityDiscriminationPhysicalHarm Prefix risk
    LabelNationality DiscriminationPhysical Harm
    IRIhttps://w3id.org/dpv/risk#NationalityDiscriminationhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's nationality or citizenship
    Date Created2024-09-30
    - + - + - + - + - @@ -18575,12 +22981,9 @@

    Non-Material Damage

    - + - - - - + @@ -18589,18 +22992,9 @@

    Non-Material Damage

    - - - - - - - - - - - - + + + @@ -18613,42 +23007,35 @@

    Non-Material Damage

    - - - - -
    -

    Non-Normality Bias

    +
    +

    Potential Consequence

    TermNonMaterialDamagePolicyRisk Prefix risk
    LabelNon-Material DamagePolicy Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PolicyRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:LegalRisk + risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageRisks and consequences regarding policy and its associated processes
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -18661,34 +23048,34 @@

    Non-Normality Bias

    - + - + + + + - - - - + - + - + - @@ -18696,43 +23083,35 @@

    Non-Normality Bias

    - - - - -
    -

    Non-Response Bias

    +
    +

    Potential Impact

    TermNonNormalityBiasPotentialConsequence Prefix risk
    LabelNon-Normality BiasPotential Consequence
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18745,34 +23124,34 @@

    Non-Response Bias

    - + - + + + + - - - - + - + - + - @@ -18780,33 +23159,30 @@

    Non-Response Bias

    - - - -
    -

    Operational Security Risk

    +
    +

    Potential Risk

    TermNonResponseBiasPotentialImpact Prefix risk
    LabelNon-Response BiasPotential Impact
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + @@ -18824,9 +23200,12 @@

    Operational Security Risk

    - + - + + + + @@ -18835,14 +23214,20 @@

    Operational Security Risk

    - + + + + - + + + + - @@ -18850,41 +23235,35 @@

    Operational Security Risk

    - - - - -
    -

    Out-Group Homogeneity Bias

    +
    +

    Potential RiskSource

    TermOperationalSecurityRiskPotentialRisk Prefix risk
    LabelOperational Security RiskPotential Risk
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    DefinitionRisks and issues that arise during operational processesIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18897,34 +23276,34 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - + - + - @@ -18936,23 +23315,23 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    +
    +

    Privacy

    TermOutGroupHomogeneityBiasPotentialRiskSource Prefix risk
    LabelOut-Group Homogeneity BiasPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + @@ -18964,8 +23343,8 @@

    Payment

    - @@ -18977,10 +23356,7 @@

    Payment

    - - - - + @@ -18990,18 +23366,9 @@

    Payment

    - - - - - - - - - - - - + + + @@ -19018,23 +23385,23 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Psychological Harm

    TermPaymentPrivacy Prefix risk
    LabelPaymentPrivacy
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#Privacy
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + @@ -19046,7 +23413,9 @@

    Personal Safety Endangerment

    - @@ -19060,7 +23429,7 @@

    Personal Safety Endangerment

    - + @@ -19069,7 +23438,7 @@

    Personal Safety Endangerment

    - + @@ -19101,38 +23470,36 @@

    Personal Safety Endangerment

    - - -
    -

    Phishing Scam

    +
    +

    Public Order Breach

    TermPersonalSafetyEndangermentPsychologicalHarm Prefix risk
    LabelPersonal Safety EndangermentPsychological Harm
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PsychologicalHarm
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Personal Safety EndangermentConcept representing Psychological Harm
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - @@ -19146,7 +23513,7 @@

    Phishing Scam

    - + @@ -19155,7 +23522,7 @@

    Phishing Scam

    - + @@ -19188,23 +23555,23 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Public Services Exclusion

    TermPhishingScamPublicOrderBreach Prefix risk
    LabelPhishing ScamPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamConcept representing Public Order Breach
    SourceENISA Threat Landscape for Ransomware Attacks 2022ISO/IEC 27005:2018
    - + - + - + @@ -19216,8 +23583,9 @@

    Physical Assault

    - @@ -19230,32 +23598,23 @@

    Physical Assault

    - + - - - - + - + - - - - - - - - + + @@ -19272,36 +23631,38 @@

    Physical Assault

    -
    -

    Physical Harm

    +
    +

    Racial Discrimination

    TermPhysicalAssaultPublicServicesExclusion Prefix risk
    LabelPhysical AssaultPublic Services Exclusion
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#PublicServicesExclusion
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -19312,7 +23673,10 @@

    Physical Harm

    - + + + + @@ -19322,7 +23686,10 @@

    Physical Harm

    - + + + + @@ -19337,35 +23704,41 @@

    Physical Harm

    -
    -

    Potential Consequence

    + + + + +
    +

    Racism

    TermPhysicalHarmRacialDiscrimination Prefix risk
    LabelPhysical HarmRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionDiscrimination against individuals because of their racial background or skin color
    Date Created2024-09-30
    - + - + - + - + - @@ -19378,12 +23751,9 @@

    Potential Consequence

    - + - - - - + @@ -19394,18 +23764,15 @@

    Potential Consequence

    - + - - - - + - @@ -19413,39 +23780,48 @@

    Potential Consequence

    -
    -

    Potential Impact

    + +
    +

    Recovery Control

    TermPotentialConsequenceRacism Prefix risk
    LabelPotential ConsequenceRacism
    IRIhttps://w3id.org/dpv/risk#PotentialConsequencehttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept can potentially be a 'consequence concept within an use-casePrejudice or discrimination against people based on their race
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -19454,12 +23830,9 @@

    Potential Impact

    - + - - - - + @@ -19470,18 +23843,15 @@

    Potential Impact

    - + - - - - + - @@ -19489,39 +23859,49 @@

    Potential Impact

    -
    -

    Potential Risk

    + +
    +

    Reduce Likelihood

    TermPotentialImpactRecoveryControl Prefix risk
    LabelPotential ImpactRecovery Control
    IRIhttps://w3id.org/dpv/risk#PotentialImpacthttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'impact' concept within an use-caseControl to recover from event
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19530,12 +23910,9 @@

    Potential Risk

    - + - - - - + @@ -19546,7 +23923,7 @@

    Potential Risk

    - + @@ -19557,7 +23934,7 @@

    Potential Risk

    - @@ -19565,39 +23942,49 @@

    Potential Risk

    -
    -

    Potential RiskSource

    + +
    +

    Reduce Severity

    TermPotentialRiskReduceLikelihood Prefix risk
    LabelPotential RiskReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#PotentialRiskhttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk' concept within an use-caseControl that reduces the likelihood of an event
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19606,12 +23993,9 @@

    Potential RiskSource

    - + - - - - + @@ -19622,7 +24006,7 @@

    Potential RiskSource

    - + @@ -19633,7 +24017,7 @@

    Potential RiskSource

    - @@ -19642,49 +24026,57 @@

    Potential RiskSource

    - - - -
    -

    Privacy

    +
    +

    Reduction Control

    TermPotentialRiskSourceReduceSeverity Prefix risk
    LabelPotential RiskSourceReduce Severity
    IRIhttps://w3id.org/dpv/risk#PotentialRiskSourcehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk source' concept within an use-caseControl that reduces the severity of an event
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -19694,14 +24086,17 @@

    Privacy

    - + + + + - @@ -19713,36 +24108,40 @@

    Privacy

    -
    -

    Psychological Harm

    + + + +
    +

    Re-identification

    TermPrivacyReductionControl Prefix risk
    LabelPrivacyReduction Control
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that reduces the likelihood or severity of an event
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -19755,23 +24154,23 @@

    Psychological Harm

    - + - + + + + - - - - + - + @@ -19796,35 +24195,37 @@

    Psychological Harm

    -
    -

    Public Order Breach

    + +
    +

    Religious Discrimination

    TermPsychologicalHarmReidentification Prefix risk
    LabelPsychological HarmRe-identification
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Psychological HarmConcept representing Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-19
    Date Modified
    - + - + - + - + - @@ -19838,32 +24239,23 @@

    Public Order Breach

    - + - - - - + - + - - - - - - - - + + @@ -19877,50 +24269,47 @@

    Public Order Breach

    - - - -
    -

    Racial Discrimination

    +
    +

    Remedy Control

    TermPublicOrderBreachReligiousDiscrimination Prefix risk
    LabelPublic Order BreachReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Public Order BreachDiscrimination based on a person's religious beliefs or practices
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -19929,7 +24318,7 @@

    Racial Discrimination

    - + @@ -19942,7 +24331,7 @@

    Racial Discrimination

    - + @@ -19950,7 +24339,7 @@

    Racial Discrimination

    - @@ -19959,48 +24348,48 @@

    Racial Discrimination

    - - - -
    -

    Racism

    +
    +

    Remove Consequence

    TermRacialDiscriminationRemedyControl Prefix risk
    LabelRacial DiscriminationRemedy Control
    IRIhttps://w3id.org/dpv/risk#RacialDiscriminationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals because of their racial background or skin colorControl to remedy consequences of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - + + + + @@ -20009,7 +24398,7 @@

    Racism

    - + @@ -20022,15 +24411,18 @@

    Racism

    - + - + + + + - @@ -20039,23 +24431,23 @@

    Racism

    -
    -

    Recovery Control

    +
    +

    Remove Impact

    TermRacismRemoveConsequence Prefix risk
    LabelRacismRemove Consequence
    IRIhttps://w3id.org/dpv/risk#Racismhttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionPrejudice or discrimination against people based on their raceControl that removes Consequence i.e. prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -20067,7 +24459,8 @@

    Recovery Control

    - @@ -20077,7 +24470,7 @@

    Recovery Control

    @@ -20088,7 +24481,7 @@

    Recovery Control

    - + @@ -20104,7 +24497,10 @@

    Recovery Control

    - + + + + @@ -20118,23 +24514,23 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Remove Source

    TermRecoveryControlRemoveImpact Prefix risk
    LabelRecovery ControlRemove Impact
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:RiskControl + risk:ImpactControl + → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl to recover from eventControl that removes Impact i.e. prevents it from materialising
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -20146,7 +24542,7 @@

    Reduce Likelihood

    - @@ -20168,7 +24564,7 @@

    Reduce Likelihood

    - + @@ -20201,48 +24597,44 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    + + + +
    +

    Remuneration

    TermReduceLikelihoodRemoveSource Prefix risk
    LabelReduce LikelihoodRemove Source
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:ReductionControl + risk:SourceControl → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure @@ -20157,7 +24553,7 @@

    Reduce Likelihood

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl that reduces the likelihood of an eventControl that removes the risk source
    - + - + - + - + - - - - - + @@ -20251,7 +24643,7 @@

    Reduce Severity

    - + @@ -20264,18 +24656,21 @@

    Reduce Severity

    - + - + + + + - + - @@ -20284,47 +24679,43 @@

    Reduce Severity

    -
    -

    Reduction Control

    + + + +
    +

    Reputational Risk

    TermReduceSeverityRenumeration Prefix risk
    LabelReduce SeverityRemuneration
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20333,7 +24724,7 @@

    Reduction Control

    - + @@ -20344,17 +24735,14 @@

    Reduction Control

    - - - - + - @@ -20366,38 +24754,37 @@

    Reduction Control

    - - - -
    -

    Re-identification

    +
    +

    Requirements Bias

    TermReductionControlReputationalRisk Prefix risk
    LabelReduction ControlReputational Risk
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -20411,31 +24798,31 @@

    Re-identification

    - + - + - + + + + - + - - - - + - + @@ -20453,23 +24840,23 @@

    Re-identification

    -
    -

    Religious Discrimination

    +
    +

    Reverse Discrimination

    TermReidentificationRequirementsBias Prefix risk
    LabelRe-identificationRequirements Bias
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Re-identificationBias that occurs in or during requirements creation
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentificationRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2022-08-192024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + @@ -20482,11 +24869,7 @@

    Religious Discrimination

    - - @@ -20500,7 +24883,7 @@

    Religious Discrimination

    - + @@ -20530,47 +24913,45 @@

    Religious Discrimination

    -
    -

    Remedy Control

    + + + +
    +

    Reward

    TermReligiousDiscriminationReverseDiscrimination Prefix risk
    LabelReligious DiscriminationReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#ReligiousDiscriminationhttps://w3id.org/dpv/risk#ReverseDiscrimination
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's religious beliefs or practicesDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    - + - + - + - + - - - - - + @@ -20579,7 +24960,7 @@

    Remedy Control

    - + @@ -20592,15 +24973,21 @@

    Remedy Control

    - + - - + + + + + + + + - @@ -20609,48 +24996,44 @@

    Remedy Control

    -
    -

    Remove Consequence

    + + + +
    +

    Rights Denied

    TermRemedyControlReward Prefix risk
    LabelRemedy ControlReward
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to remedy consequences of eventSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20659,31 +25042,104 @@

    Remove Consequence

    - + + + + + + + + + + + + + + + + + + + + +
    TermRemoveConsequenceRightsDenied Prefix risk
    LabelRemove ConsequenceRights Denied
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RightsDenied
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Rights Eroded

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - + + - - - - + + + + + + + + + + + + + + - @@ -20692,48 +25148,44 @@

    Remove Consequence

    -
    -

    Remove Impact

    + + + +
    +

    Rights Exercise Prevented

    TermRightsErodedPrefixrisk
    LabelRights Eroded
    IRIhttps://w3id.org/dpv/risk#RightsEroded
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    Date Created2024-05-19DefinitionThe gradual weakening or reduction of the scope and protection of rights
    ContributorsHarshvardhan J. Pandit
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20742,9 +25194,12 @@

    Remove Impact

    - + - + + + + @@ -20755,18 +25210,21 @@

    Remove Impact

    - + - + + + + - + - @@ -20775,48 +25233,43 @@

    Remove Impact

    -
    -

    Remove Source

    + + + +
    +

    Rights Impact

    TermRemoveImpactRightsExercisePrevented Prefix risk
    LabelRemove ImpactRights Exercise Prevented
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevented
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-192022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20825,22 +25278,31 @@

    Remove Source

    - + - + + + + - + + + + - + - + + + + @@ -20849,7 +25311,7 @@

    Remove Source

    - @@ -20861,23 +25323,23 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Rights Limited

    TermRemoveSourceRightsImpact Prefix risk
    LabelRemove SourceRights Impact
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceConcept representing Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -20889,7 +25351,8 @@

    Remuneration

    - @@ -20903,9 +25366,12 @@

    Remuneration

    - + - + + + + @@ -20916,7 +25382,7 @@

    Remuneration

    - + @@ -20942,23 +25408,23 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Rights Obstructed

    TermRenumerationRightsLimited Prefix risk
    LabelRemunerationRights Limited
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimited
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    - + - + - + @@ -20970,7 +25436,9 @@

    Reputational Risk

    - @@ -20983,9 +25451,12 @@

    Reputational Risk

    - + - + + + + @@ -21013,37 +25484,37 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    Rights Unfulfilled

    TermReputationalRiskRightsObstructed Prefix risk
    LabelReputational RiskRights Obstructed
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsObstructed
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that affect the reputation of the organisationInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    - + - + - + - + - @@ -21056,32 +25527,23 @@

    Requirements Bias

    - + - + - - - - + - - - - + - - - - + @@ -21098,40 +25560,36 @@

    Requirements Bias

    -
    -

    Reverse Discrimination

    +
    +

    Rights Violated

    TermRequirementsBiasRightsUnfulfilled Prefix risk
    LabelRequirements BiasRights Unfulfilled
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs in or during requirements creationFailure to meet or complete the fulfilment of rights
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifestHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -21145,9 +25603,12 @@

    Reverse Discrimination

    - + - + + + + @@ -21158,10 +25619,16 @@

    Reverse Discrimination

    - + - - + + + + + + + + @@ -21172,43 +25639,42 @@

    Reverse Discrimination

    TermReverseDiscriminationRightsViolated Prefix risk
    LabelReverse DiscriminationRights Violated
    IRIhttps://w3id.org/dpv/risk#ReverseDiscriminationhttps://w3id.org/dpv/risk#RightsViolated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equalityThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-09-302022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    + + + + - - - - -
    -

    Reward

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -21221,34 +25687,34 @@

    Reward

    - + - + + + + - + - - - - + - + - @@ -21256,41 +25722,35 @@

    Reward

    - - - - -
    -

    Erosion of Rights

    +
    +

    Risk Assessment

    TermRewardRiskAnalysis Prefix risk
    LabelRewardRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2024-04-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21303,28 +25763,31 @@

    Erosion of Rights

    - + - - - - + - + + + + - + + + + - @@ -21332,45 +25795,46 @@

    Erosion of Rights

    - - - - -
    -

    Obstruction of Rights

    +
    +

    Risk Control

    TermRightErodedRiskAssessment Prefix risk
    LabelErosion of RightsRisk Assessment
    IRIhttps://w3id.org/dpv/risk#RightErodedhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
    DefinitionThe gradual weakening or reduction of the scope and protection of rightsAssessment of risk involving its identification, analysis, and evaluation
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-02-14
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -21379,13 +25843,13 @@

    Obstruction of Rights

    - + - - - - + + + + @@ -21393,14 +25857,17 @@

    Obstruction of Rights

    - + + + + - @@ -21408,42 +25875,33 @@

    Obstruction of Rights

    - - - - -
    -

    Denial of Rights

    +
    +

    Risk Management

    TermRightObstructedRiskControl Prefix risk
    LabelObstruction of RightsRisk Control
    IRIhttps://w3id.org/dpv/risk#RightObstructedhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionInterference with or blocking of the exercise of rightsControl that modifies risk
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + @@ -21455,28 +25913,31 @@

    Denial of Rights

    - + - - - - + - + + + + - + + + + - @@ -21485,40 +25946,36 @@

    Denial of Rights

    - - - -
    -

    Prevent Exercising of Rights

    +
    +

    Risk Matrix

    TermRightsDenialRiskManagement Prefix risk
    LabelDenial of RightsRisk Management
    IRIhttps://w3id.org/dpv/risk#RightsDenialhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept -
    DefinitionThe refusal or withholding or denial of the existence or applicability of rightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-06-12
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21531,37 +25988,34 @@

    Prevent Exercising of Rights

    - + - - - - + - + + + + - + - - - - + - + - @@ -21570,39 +26024,37 @@

    Prevent Exercising of Rights

    - - - -
    -

    Impact to Rights

    +
    +

    Risk Matrix 3x3

    TermRightsExercisePreventionRiskMatrix Prefix risk
    LabelPrevent Exercising of RightsRisk Matrix
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionActions or measures that prevent an individual or group from exercising their legal rights.Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceIEC 31010:2019
    Date Created2022-08-182024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21615,20 +26067,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -21636,10 +26082,7 @@

    Impact to Rights

    - - - - + @@ -21648,7 +26091,7 @@

    Impact to Rights

    - @@ -21657,40 +26100,37 @@

    Impact to Rights

    - - - -
    -

    Limitation of Rights

    +
    +

    Risk Matrix 5x5

    TermRightsImpactRiskMatrix3x3 Prefix risk
    LabelImpact to RightsRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Impact to RightsA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21703,12 +26143,9 @@

    Limitation of Rights

    - + - - - - + @@ -21719,21 +26156,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -21742,40 +26176,37 @@

    Limitation of Rights

    - - - -
    -

    Unfulfilment of Rights

    +
    +

    Risk Matrix 7x7

    TermRightsLimitationRiskMatrix5x5 Prefix risk
    LabelLimitation of RightsRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionA limitation or restrictions on the scope or exercise of rightsA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21788,12 +26219,9 @@

    Unfulfilment of Rights

    - + - - - - + @@ -21802,14 +26230,20 @@

    Unfulfilment of Rights

    - + + + + - + + + + - @@ -21817,45 +26251,43 @@

    Unfulfilment of Rights

    - - - - -
    -

    Violation of Rights

    +
    +

    Risk Source

    TermRightsUnfulfilledRiskMatrix7x7 Prefix risk
    LabelUnfulfilment of RightsRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RightsUnfulfilledhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionFailure to meet or complete the fulfilment of rightsA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - + + + + @@ -21864,12 +26296,9 @@

    Violation of Rights

    - + - - - - + @@ -21880,61 +26309,57 @@

    Violation of Rights

    - + - - - - + -
    TermRightsViolationRiskSource Prefix risk
    LabelViolation of RightsRisk Source
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rightsThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182024-02-14
    Date Modified 2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + - + - + - @@ -21948,23 +26373,20 @@

    Risk Analysis

    - + - - - - + - + @@ -21975,7 +26397,7 @@

    Risk Analysis

    - @@ -21983,35 +26405,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRiskAnalysisRM3x3S1L1 Prefix risk
    LabelRisk AnalysisLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22024,31 +26450,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -22056,46 +26482,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRiskAssessmentRM3x3S1L2 Prefix risk
    LabelRisk AssessmentLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -22104,13 +26527,10 @@

    Risk Control

    - + - - - @@ -22120,15 +26540,18 @@

    Risk Control

    - + - + + + + - @@ -22136,33 +26559,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRiskControlRM3x3S1L3 Prefix risk
    LabelRisk ControlModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -22174,31 +26604,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -22207,35 +26637,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRiskManagementRM3x3S2L1 Prefix risk
    LabelRisk ManagementLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22249,23 +26681,20 @@

    Risk Matrix

    - + - - - - + - + @@ -22276,7 +26705,7 @@

    Risk Matrix

    - @@ -22285,23 +26714,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRiskMatrixRM3x3S2L2 Prefix risk
    LabelRisk MatrixModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22313,7 +26742,8 @@

    Risk Matrix 3x3

    - @@ -22328,7 +26758,7 @@

    Risk Matrix 3x3

    - + @@ -22361,23 +26791,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRiskMatrix3x3RM3x3S2L3 Prefix risk
    LabelRisk Matrix 3x3High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22389,7 +26819,8 @@

    Risk Matrix 5x5

    - @@ -22404,7 +26835,7 @@

    Risk Matrix 5x5

    - + @@ -22437,23 +26868,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRiskMatrix5x5RM3x3S3L1 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22465,7 +26896,8 @@

    Risk Matrix 7x7

    - @@ -22480,7 +26912,7 @@

    Risk Matrix 7x7

    - + @@ -22512,43 +26944,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRiskMatrix7x7RM3x3S3L2 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + - + - - - - - + @@ -22557,7 +26989,7 @@

    Risk Source

    - + @@ -22570,18 +27002,18 @@

    Risk Source

    - + + - - - - + + + - @@ -22590,23 +27022,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRiskSourceRM3x3S3L3 Prefix risk
    LabelRisk SourceHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22618,7 +27050,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -22667,23 +27099,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM3x3S1L1RM5x5S1L1 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S1L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22634,7 +27066,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22695,7 +27127,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -22744,23 +27176,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM3x3S1L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S1L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22711,7 +27143,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22772,7 +27204,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -22821,23 +27253,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM3x3S1L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S1L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22788,7 +27220,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22849,7 +27281,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -22898,23 +27330,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM3x3S2L1RM5x5S1L4 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S1L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22865,7 +27297,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22926,7 +27358,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -22975,23 +27407,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM3x3S2L2RM5x5S1L5 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22942,7 +27374,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -23003,7 +27435,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -23052,23 +27484,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM3x3S2L3RM5x5S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S2L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23019,7 +27451,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23080,7 +27512,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -23129,23 +27561,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM3x3S3L1RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S2L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23096,7 +27528,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -23157,7 +27589,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -23206,23 +27638,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM3x3S3L2RM5x5S2L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23173,7 +27605,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23234,7 +27666,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -23283,23 +27715,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM3x3S3L3RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23250,7 +27682,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -23327,7 +27759,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -23360,23 +27792,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S1L1RM5x5S2L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -23404,7 +27836,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -23437,23 +27869,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S1L2RM5x5S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23481,7 +27913,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -23514,23 +27946,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S1L3RM5x5S3L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23558,7 +27990,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -23591,23 +28023,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S1L4RM5x5S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23635,7 +28067,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -23668,23 +28100,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S1L5RM5x5S3L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23712,7 +28144,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -23745,23 +28177,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S2L1RM5x5S3L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23789,7 +28221,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -23822,23 +28254,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S2L2RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23866,7 +28298,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -23899,23 +28331,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S2L3RM5x5S4L2 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23943,7 +28375,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -23976,23 +28408,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S2L4RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24020,7 +28452,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -24053,23 +28485,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S2L5RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24097,7 +28529,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -24130,23 +28562,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S3L1RM5x5S4L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24174,7 +28606,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -24207,23 +28639,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S3L2RM5x5S5L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -24251,7 +28683,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -24284,23 +28716,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S3L3RM5x5S5L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -24328,7 +28760,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -24361,23 +28793,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S3L4RM5x5S5L3 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24405,7 +28837,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -24438,23 +28870,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S3L5RM5x5S5L4 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24482,7 +28914,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -24515,23 +28947,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S4L1RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24543,7 +28975,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -24592,23 +29024,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S4L2RM7x7S1L1 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24559,7 +28991,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24620,7 +29052,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -24669,23 +29101,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S4L3RM7x7S1L2 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24636,7 +29068,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24697,7 +29129,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -24746,23 +29178,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S4L4RM7x7S1L3 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24713,7 +29145,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24774,7 +29206,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -24823,23 +29255,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S4L5RM7x7S1L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24790,7 +29222,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24851,7 +29283,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermRM5x5S5L1RM7x7S1L5 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24867,7 +29299,84 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK +
    +
    + + + +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -24900,23 +29409,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S1L6Prefixrisk
    LabelVery Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6
    Typerdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24928,7 +29437,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -24977,23 +29486,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S5L2RM7x7S1L7 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24944,7 +29453,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -25005,7 +29514,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -25054,23 +29563,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S5L3RM7x7S2L1 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25021,7 +29530,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25082,7 +29591,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -25131,23 +29640,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S5L4RM7x7S2L2 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25098,7 +29607,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -25159,7 +29668,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -25208,23 +29717,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S5L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25175,7 +29684,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -25252,7 +29761,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -25285,23 +29794,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S1L1RM7x7S2L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -25329,7 +29838,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -25362,23 +29871,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S1L2RM7x7S2L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -25406,7 +29915,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -25439,23 +29948,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S1L3RM7x7S2L6 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -25483,7 +29992,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -25516,23 +30025,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S1L4RM7x7S2L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25560,7 +30069,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -25593,23 +30102,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S1L5RM7x7S3L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25637,7 +30146,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -25670,23 +30179,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S1L6RM7x7S3L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25714,7 +30223,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -25747,23 +30256,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S1L7RM7x7S3L3 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25791,7 +30300,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -25824,23 +30333,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S2L1RM7x7S3L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25868,7 +30377,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -25901,23 +30410,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S2L2RM7x7S3L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25945,7 +30454,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -25978,23 +30487,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S2L3RM7x7S3L6 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -26022,7 +30531,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -26055,23 +30564,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S2L4RM7x7S3L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26099,7 +30608,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -26132,23 +30641,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S2L5RM7x7S4L1 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -26176,7 +30685,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -26209,23 +30718,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S2L6RM7x7S4L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26253,7 +30762,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -26286,23 +30795,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S2L7RM7x7S4L3 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26330,7 +30839,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -26363,23 +30872,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S3L1RM7x7S4L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26407,7 +30916,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -26440,23 +30949,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S3L2RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -26484,7 +30993,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -26517,23 +31026,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S3L3RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26561,7 +31070,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -26594,23 +31103,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S3L4RM7x7S4L7 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26638,7 +31147,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -26671,23 +31180,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S3L5RM7x7S5L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26715,7 +31224,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -26748,23 +31257,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S3L6RM7x7S5L2 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26792,7 +31301,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -26825,23 +31334,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S3L7RM7x7S5L3 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26869,7 +31378,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -26902,23 +31411,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S4L1RM7x7S5L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26946,7 +31455,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -26979,23 +31488,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S4L2RM7x7S5L5 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27023,7 +31532,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -27056,23 +31565,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S4L3RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27100,7 +31609,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -27133,23 +31642,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S4L4RM7x7S5L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27177,7 +31686,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -27210,23 +31719,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S4L5RM7x7S6L1 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -27254,7 +31763,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -27287,23 +31796,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S4L6RM7x7S6L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27331,7 +31840,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -27364,23 +31873,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S4L7RM7x7S6L3 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27408,7 +31917,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -27441,23 +31950,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S5L1RM7x7S6L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -27485,7 +31994,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -27518,23 +32027,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S5L2RM7x7S6L5 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27562,7 +32071,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -27595,23 +32104,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S5L3RM7x7S6L6 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27639,7 +32148,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -27672,23 +32181,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S5L4RM7x7S6L7 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27716,7 +32225,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -27749,23 +32258,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S5L5RM7x7S7L1 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27793,7 +32302,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -27826,23 +32335,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S5L6RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27870,7 +32379,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -27903,23 +32412,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S5L7RM7x7S7L3 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27947,7 +32456,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -27980,23 +32489,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S6L1RM7x7S7L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -28024,7 +32533,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -28057,23 +32566,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S6L2RM7x7S7L5 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -28101,7 +32610,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -28134,23 +32643,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S6L3RM7x7S7L6 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -28178,7 +32687,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -28211,38 +32720,41 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S6L4RM7x7S7L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -28255,31 +32767,37 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - + + + + - + + + + - + - + - @@ -28288,38 +32806,43 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + + + +
    +

    Sabotage

    TermRM7x7S6L5RuleBasedSystemDesign Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28332,14 +32855,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -28347,7 +32873,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -28356,7 +32885,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -28365,38 +32894,43 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    + + + +
    +

    Sampling Bias

    TermRM7x7S6L6Sabotage Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighConcept representing Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28409,31 +32943,34 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + - + + + + - + - + - @@ -28442,38 +32979,42 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + + +
    +

    Scam

    TermRM7x7S6L7SamplingBias Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28486,14 +33027,17 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + @@ -28501,7 +33045,10 @@

    Low Risk (RM7x7 S:7 L:1)

    - + + + + @@ -28510,7 +33057,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - @@ -28519,38 +33066,42 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + + + +
    +

    Security Attack

    TermRM7x7S7L1Scam Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowConcept representing Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28563,7 +33114,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -28574,20 +33125,14 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - - - - + - - - - + - @@ -28596,38 +33141,43 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S7L2SecurityAttack Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateConcept representing an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28640,14 +33190,17 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + @@ -28655,7 +33208,10 @@

    High Risk (RM7x7 S:7 L:3)

    - + + + + @@ -28664,7 +33220,7 @@

    High Risk (RM7x7 S:7 L:3)

    - @@ -28673,38 +33229,42 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Selection Bias

    TermRM7x7S7L3SecurityBreach Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighConcept representing Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28717,31 +33277,34 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + - + + + + - + - + - @@ -28750,38 +33313,45 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + + + + + + +
    +

    Service Alternative Offered

    TermRM7x7S7L4SelectionBias Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28794,7 +33364,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -28807,18 +33377,15 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - - - - + - @@ -28827,38 +33394,40 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    + + + +
    +

    Service Cost Increased

    TermRM7x7S7L5ServiceAlternativeOffered Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Service Alternative Offered
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#ServiceAlternativeOffered
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28871,7 +33440,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -28884,18 +33453,15 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - - - - + - @@ -28904,38 +33470,40 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + +
    +

    Service Denied

    TermRM7x7S7L6ServiceCostIncreased Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Service Cost Increased
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#ServiceCostIncreased
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28948,7 +33516,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -28961,18 +33529,15 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - - - - + - @@ -28984,37 +33549,37 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    +
    +

    Service Limited

    TermRM7x7S7L7ServiceDenied Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Service Denied
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#ServiceDenied
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -29027,32 +33592,23 @@

    Rule-Based System Design

    - + - - - - + - - - - + - + - - - - + @@ -29069,38 +33625,36 @@

    Rule-Based System Design

    - - -
    -

    Sabotage

    +
    +

    Service Not Provided

    TermRuleBasedSystemDesignServiceLimited Prefix risk
    LabelRule-Based System DesignService Limited
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#ServiceLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designStub
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29114,32 +33668,23 @@

    Sabotage

    - + - - - - + - + - - - - - - - - + + @@ -29156,39 +33701,37 @@

    Sabotage

    -
    -

    Sampling Bias

    +
    +

    Service Partially Provided

    TermSabotageServiceNotProvided Prefix risk
    LabelSabotageService Not Provided
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#ServiceNotProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SabotageStub
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29201,29 +33744,23 @@

    Sampling Bias

    - + - - - - + - + - - - - + @@ -29240,37 +33777,36 @@

    Sampling Bias

    - -
    -

    Scam

    +
    +

    Service Provided

    TermSamplingBiasServicePartiallyProvided Prefix risk
    LabelSampling BiasService Partially Provided
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#ServicePartiallyProvided
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29284,32 +33820,23 @@

    Scam

    - + - - - - + - + - - - - - - - - + + @@ -29326,37 +33853,36 @@

    Scam

    - - -
    -

    Security Attack

    +
    +

    Service Provision Delayed

    TermScamServiceProvided Prefix risk
    LabelScamService Provided
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#ServiceProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ScamStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29370,7 +33896,7 @@

    Security Attack

    - + @@ -29381,7 +33907,10 @@

    Security Attack

    - + + + + @@ -29400,38 +33929,111 @@

    Security Attack

    +
    +

    Service Quality Reduced

    +
    TermSecurityAttackServiceProvisionDelayed Prefix risk
    LabelSecurity AttackService Provision Delayed
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#ServiceProvisionDelayed
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itStub
    Date Created2024-10-21
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceQualityReducedPrefixrisk
    LabelService Quality Reduced
    IRIhttps://w3id.org/dpv/risk#ServiceQualityReduced
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    -
    -

    Security Breach

    + + + + +
    +

    None

    - + - + - + - + - @@ -29445,32 +34047,23 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + @@ -29487,38 +34080,37 @@

    Security Breach

    -
    -

    Selection Bias

    +
    +

    Service Security Reduced

    TermSecurityBreachServiceRelatedConsequence Prefix risk
    LabelSecurity BreachNone
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ServiceRelatedConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Security BreachA consequence related to the provision of a service
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29531,29 +34123,23 @@

    Selection Bias

    - + - - - - + - + - - - - + @@ -29570,6 +34156,77 @@

    Selection Bias

    +
    +

    Service Termination

    +
    TermSelectionBiasServiceSecurityReduced Prefix risk
    LabelSelection BiasService Security Reduced
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ServiceSecurityReduced
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceTerminationPrefixrisk
    LabelService Termination
    IRIhttps://w3id.org/dpv/risk#ServiceTermination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + @@ -29605,12 +34262,7 @@

    Sex Discrimination

    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29686,11 +34338,7 @@

    Sexism

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29767,6 +34415,8 @@

    Sexual Harassment

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29835,11 +34485,7 @@

    SexualOrientation Discrimination

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29916,6 +34562,8 @@

    Sexual Violence

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29928,7 +34576,7 @@

    Sexual Violence

    Definition - Something that acts as or causes Sexual Violence + Concept representing Sexual Violence @@ -30005,7 +34653,7 @@

    Share Risk

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl @@ -30082,7 +34730,8 @@

    Simpson'S Paradox Bias

    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30162,7 +34811,8 @@

    Social Disadvantage

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30176,7 +34826,7 @@

    Social Disadvantage

    Definition - Something that acts as or causes Social Disadvantage + Concept representing Social Disadvantage @@ -30245,7 +34895,8 @@

    Societal Bias

    Broader/Parent types risk:CognitiveBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30325,7 +34976,8 @@

    Societal Health & Safety

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30366,30 +35018,31 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + +
    +

    Societal Risk Concept

    - + - + - + - + @@ -30407,9 +35060,12 @@

    Societal Risk

    - + - + + + + @@ -30418,7 +35074,10 @@

    Societal Risk

    - + + + + @@ -30472,7 +35131,7 @@

    Source Control

    @@ -30551,6 +35210,7 @@

    Spoofing

    @@ -30564,7 +35224,7 @@

    Spoofing

    - + @@ -30636,7 +35296,8 @@

    Statistical Bias

    @@ -30718,6 +35379,7 @@

    System Failure

    @@ -30731,7 +35393,7 @@

    System Failure

    - + @@ -30777,37 +35439,124 @@

    System Failure

    - -
    -

    System Intrusion

    + +
    +

    System Intrusion

    +
    TermSocietalRiskSocietalRiskConcept Prefix risk
    LabelSocietal RiskSocietal Risk Concept
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#SocietalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societyRisk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process
    Usage NoteSocietal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure
    Date Created2024-10-21
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    Broader/Parent types risk:MaliciousActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingConcept representing Spoofing
    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureConcept representing System Failure
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermSystemIntrusionPrefixrisk
    LabelSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    System Malfunction

    - + - + - + - + - @@ -30821,16 +35570,19 @@

    System Intrusion

    - + - + + + + - + @@ -30864,36 +35616,35 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Technical Risk Concept

    TermSystemIntrusionSystemMalfunction Prefix risk
    LabelSystem IntrusionSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System IntrusionConcept representing System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - @@ -30906,35 +35657,26 @@

    System Malfunction

    - + - + - - - - + - + - - - - - - - - + + @@ -30979,7 +35721,8 @@

    Terrorism

    - @@ -30993,7 +35736,7 @@

    Terrorism

    - + @@ -31218,12 +35961,7 @@

    Transphobia

    - - @@ -31303,6 +36041,7 @@

    Unauthorised Access to Premises

    @@ -31316,7 +36055,7 @@

    Unauthorised Access to Premises

    - + @@ -31390,6 +36129,7 @@

    Unauthorised Activity

    @@ -31403,7 +36143,7 @@

    Unauthorised Activity

    - + @@ -31465,6 +36205,7 @@

    Unauthorised Code Access

    @@ -31478,7 +36219,7 @@

    Unauthorised Code Access

    - + @@ -31551,6 +36292,7 @@

    Unauthorised Code Disclosure

    @@ -31564,7 +36306,7 @@

    Unauthorised Code Disclosure

    - + @@ -31637,6 +36379,7 @@

    Unauthorised Code Modification

    @@ -31650,7 +36393,7 @@

    Unauthorised Code Modification

    - + @@ -31723,6 +36466,7 @@

    Unauthorised Data Access

    @@ -31736,7 +36480,7 @@

    Unauthorised Data Access

    - + @@ -31809,6 +36553,7 @@

    Unauthorised Data Disclosure

    @@ -31822,7 +36567,7 @@

    Unauthorised Data Disclosure

    - + @@ -31895,6 +36640,7 @@

    Unauthorised Data Modification

    @@ -31908,7 +36654,7 @@

    Unauthorised Data Modification

    - + @@ -31981,6 +36727,7 @@

    Unauthorised Information Disclosure

    @@ -31994,7 +36741,7 @@

    Unauthorised Information Disclosure

    - + @@ -32067,6 +36814,7 @@

    Unauthorised Re-Identification

    @@ -32080,7 +36828,7 @@

    Unauthorised Re-Identification

    - + @@ -32150,6 +36898,7 @@

    Unauthorised Resource Use

    @@ -32163,7 +36912,7 @@

    Unauthorised Resource Use

    - + @@ -32237,6 +36986,7 @@

    Unauthorised System Access

    @@ -32250,7 +37000,7 @@

    Unauthorised System Access

    - + @@ -32323,6 +37073,7 @@

    Unauthorised System Modification

    @@ -32336,7 +37087,7 @@

    Unauthorised System Modification

    - + @@ -32410,6 +37161,7 @@

    Unwanted Code Deletion

    @@ -32423,7 +37175,7 @@

    Unwanted Code Deletion

    - + @@ -32497,6 +37249,7 @@

    Unwanted Data Deletion

    @@ -32510,7 +37263,7 @@

    Unwanted Data Deletion

    - + @@ -32583,6 +37336,7 @@

    Unwanted Disclosure of Data

    @@ -32596,7 +37350,7 @@

    Unwanted Disclosure of Data

    - + @@ -32665,7 +37419,8 @@

    User Risks

    - @@ -33251,7 +38006,9 @@

    Violating Code of Conduct

    - @@ -33264,7 +38021,7 @@

    Violating Code of Conduct

    - + @@ -33309,7 +38066,7 @@

    Violating Code of Conduct

    -

    Violation of Contractual Obligation

    +

    Violating Contractual Obligation

    TermSystemMalfunctionTechnicalRiskConcept Prefix risk
    LabelSystem MalfunctionTechnical Risk Concept
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#TechnicalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionRisk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process
    Usage NoteHere system refers to both hardware and software systemsTechnical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Broader/Parent types risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismConcept representing Terrorism
    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesConcept representing Unauthorised Access to Premises
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcept representing Unauthorised Activity
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code AccessConcept representing Unauthorised Code Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureConcept representing Unauthorised Code Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code ModificationConcept representing Unauthorised Code Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data AccessConcept representing Unauthorised Data Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureConcept representing Unauthorised Data Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data ModificationConcept representing Unauthorised Data Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureConcept representing Unauthorised Information Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationConcept representing Unauthorised Re-Identification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Resource UseConcept representing Unauthorised Resource Use
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System AccessConcept representing Unauthorised System Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System ModificationConcept representing Unauthorised System Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Code DeletionConcept representing Unwanted Code Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Data DeletionConcept representing Unwanted Data Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataConcept representing Unwanted Disclosure of Data
    Broader/Parent types dpv:RiskConcept + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Code of ConductConcept representing Violation of Code of Conduct
    Usage Note
    @@ -33320,7 +38077,7 @@

    Violation of Contractual Obligation

    - + @@ -33336,7 +38093,15 @@

    Violation of Contractual Obligation

    - + + @@ -33349,7 +38114,7 @@

    Violation of Contractual Obligation

    - + @@ -33421,7 +38186,9 @@

    Violating Ethics Code

    - @@ -33434,7 +38201,7 @@

    Violating Ethics Code

    - + @@ -33479,7 +38246,7 @@

    Violating Ethics Code

    -

    Violation of Legal Obligations

    +

    Violating Legal Obligation

    LabelViolation of Contractual ObligationViolating Contractual Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsConcept representing Violation of Contractual Obligations
    Usage Note
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Ethics CodeConcept representing Violation of Ethics Code
    Usage Note
    @@ -33490,7 +38257,7 @@

    Violation of Legal Obligations

    - + @@ -33506,7 +38273,15 @@

    Violation of Legal Obligations

    - + + @@ -33519,7 +38294,7 @@

    Violation of Legal Obligations

    - + @@ -33563,6 +38338,81 @@

    Violation of Legal Obligations

    +
    +

    Violating Obligation

    +
    LabelViolation of Legal ObligationsViolating Legal Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Legal ObligationsConcept representing Violation of Legal Obligations
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingObligationPrefixrisk
    LabelViolating Obligation
    IRIhttps://w3id.org/dpv/risk#ViolatingObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +

    Violating Policy

    @@ -33591,7 +38441,9 @@

    Violating Policy

    - @@ -33604,7 +38456,7 @@

    Violating Policy

    - + @@ -33633,8 +38485,83 @@

    Violating Policy

    +
    +

    Violating Prohibition

    +
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policyConcept representing violation of policy which can be either internal or external policy
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingProhibitionPrefixrisk
    LabelViolating Prohibition
    IRIhttps://w3id.org/dpv/risk#ViolatingProhibition
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +
    -

    Violation of Statutory Obligations

    +

    Violating Statutory Obligations

    @@ -33645,7 +38572,7 @@

    Violation of Statutory Obligations

    - + @@ -33661,7 +38588,15 @@

    Violation of Statutory Obligations

    - + + @@ -33674,7 +38609,7 @@

    Violation of Statutory Obligations

    - + @@ -33749,6 +38684,8 @@

    Violence against children

    @@ -33761,7 +38698,7 @@

    Violence against children

    - + @@ -34124,74 +39061,78 @@

    caused by threat

    -
    -

    caused by vulnerability

    -
    LabelViolation of Statutory ObligationsViolating Statutory Obligations
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Statutory ObligationsConcept representing Violation of Statutory Obligations
    Usage Note Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Child ViolenceConcept representing Child Violence
    Usage Note
    - - - - - - - - - - - - - - - - - - - - - - - +
    +

    caused by vulnerability

    +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability +
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK +
    +
    + + - - - - - - Range includes - risk:Vulnerability - - - - - - Definition - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - - - - - - - - - - Date Created - 2024-02-14 - - - - - - - See More: - section CORE in RISK - - - - -
    @@ -34277,12 +39218,32 @@

    caused by vulnerability

    + + + + + + + + + + + + + + + + + + + + + + - - @@ -34568,6 +39529,18 @@

    exploits vulnerability

    + + + + + + + + + + + + @@ -34646,7 +39619,7 @@

    has control

    See More: - section CORE in RISK + section CORE in DEX @@ -34994,6 +39967,48 @@

    has vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35107,6 +40122,7 @@

    has vulnerability

    +
    @@ -35497,6 +40513,61 @@

    is vulnerability of

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35696,10 +40767,100 @@

    refers to risk

    - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36640,6 +41801,12 @@

    External

    + + + + + + @@ -36658,6 +41825,12 @@

    External

    + + + + + + @@ -36672,6 +41845,7 @@

    External

    + @@ -36690,6 +41864,17 @@

    External

    + + + + + + + + + + + @@ -36792,6 +41977,18 @@

    External

    + + + + + + + + + + + + @@ -36879,6 +42076,12 @@

    External

    + + + + + + @@ -36890,6 +42093,42 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36961,6 +42200,7 @@

    External

    + @@ -37042,6 +42282,7 @@

    External

    + @@ -37075,12 +42316,36 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + @@ -37192,6 +42457,7 @@

    External

    + @@ -37210,6 +42476,11 @@

    External

    + + + + + @@ -37223,6 +42494,24 @@

    External

    + + + + + + + + + + + + + + + + + + @@ -37263,6 +42552,12 @@

    External

    + + + + + + @@ -37740,6 +43035,78 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -37770,6 +43137,7 @@

    External

    + @@ -37815,6 +43183,13 @@

    External

    + + + + + + + @@ -37992,6 +43367,16 @@

    External

    + + + + + + + + + + diff --git a/2.1-dev/risk/modules/risk_taxonomy-owl.jsonld b/2.1-dev/risk/modules/risk_taxonomy-owl.jsonld index 7d78f6587..58c329dde 100644 --- a/2.1-dev/risk/modules/risk_taxonomy-owl.jsonld +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.jsonld @@ -1,18 +1,18 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#NationalityDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToFulfillLegalObligations", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22,7 +22,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -34,76 +34,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's nationality or citizenship" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Nationality Discrimination" + "@value": "Inability to Fulfill Legal Obligations" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - HTML serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect groups in society" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#ServiceNotProvided", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -113,7 +106,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -125,41 +118,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Service Not Provided" } ] }, { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -181,7 +158,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8" + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -191,7 +168,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -203,79 +180,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Concept representing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Scam" } ] }, { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8", + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Judicial Costs" + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -284,7 +247,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -296,26 +259,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Concept representing Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -326,7 +303,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-13" } ], "http://purl.org/dc/terms/modified": [ @@ -335,11 +312,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -347,7 +319,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -359,48 +331,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Concept representing Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" - } - ] - }, - { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Harm" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misogyny", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -408,7 +364,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -420,25 +376,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against women" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misogyny" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -460,7 +416,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9d18ac853d6249008536496d60a088cd" + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -470,7 +426,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -482,24 +438,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Concept representing Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Fraud" } ] }, { - "@id": "_:N9d18ac853d6249008536496d60a088cd", + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce", "@type": [ "https://schema.org/WebPage" ], @@ -515,14 +465,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousUse", "@type": [ - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -544,7 +493,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N809a964650274e1ca9c544fb513732ef" + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -554,7 +503,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -566,81 +515,79 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Concept representing erroneous use (of something)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Erroneous Use" } ] }, { - "@id": "_:N809a964650274e1ca9c544fb513732ef", + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Judicial Penalty" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightEroded", + "@id": "https://w3id.org/dpv/risk/owl#ServiceLimited", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -648,7 +595,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -660,41 +607,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The gradual weakening or reduction of the scope and protection of rights" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erosion of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Service Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -703,6 +645,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -710,59 +657,64 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Concept representing Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#GenderDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neee39564ca4e493181200a260513b3de" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -772,7 +724,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -784,41 +736,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:Neee39564ca4e493181200a260513b3de", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -840,7 +774,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" + "@id": "_:Na263f2c7d5914d86a7568447eb141586" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -850,59 +784,59 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Concept representing Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Violating Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", + "@id": "_:Na263f2c7d5914d86a7568447eb141586", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -924,7 +858,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -934,7 +868,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -946,62 +880,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Concept representing Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1011,7 +940,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1023,40 +952,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" - } - ] - }, - { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1078,7 +994,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1088,7 +1004,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1100,18 +1016,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Concept representing Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161", "@type": [ "https://schema.org/WebPage" ], @@ -1127,35 +1043,30 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1165,7 +1076,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1177,46 +1088,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Cognitive Bias" } ] }, { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DisabilityDiscrimination", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1226,7 +1132,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1238,48 +1144,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on physical or mental disabilities" + "@value": "Concept representing Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Disability Discrimination" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#ServiceDenied", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N366da704654a4b4682d8de807d0f1bef" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1289,7 +1177,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1301,56 +1189,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Service Denied" } ] }, { - "@id": "_:N366da704654a4b4682d8de807d0f1bef", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToProvideHealthCare", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1360,7 +1253,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1372,26 +1265,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Inability to Provide Health Care" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1399,7 +1315,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1408,20 +1324,43 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Identity Fraud" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1443,7 +1382,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1453,36 +1392,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Concept representing Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f", "@type": [ "https://schema.org/WebPage" ], @@ -1498,30 +1431,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBias", + "@id": "https://w3id.org/dpv/risk/owl#ServiceCostIncreased", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1531,7 +1453,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Bias" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1543,48 +1465,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Bias" + "@value": "Service Cost Increased" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#PersonalisationEnabled", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1594,7 +1498,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1606,64 +1510,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" - } - ] - }, - { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Personalisation Enabled" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1671,7 +1537,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1683,42 +1549,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#ServiceTermination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1726,7 +1582,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1738,25 +1594,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Service Termination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1778,7 +1635,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" + "@id": "_:N98503b14c8cf4817af92c366e96c81e7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1788,7 +1645,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1800,68 +1657,45 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Concept representing Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", + "@id": "_:N98503b14c8cf4817af92c366e96c81e7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingProhibition", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1871,7 +1705,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1883,41 +1717,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Violating Prohibition" } ] }, { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1928,7 +1745,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -1937,11 +1754,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N95204127ed924036926f89eb7e5b0678" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1949,7 +1761,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1961,42 +1773,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Concept representing Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" - } - ] - }, - { - "@id": "_:N95204127ed924036926f89eb7e5b0678", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsDenial", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevented", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2016,41 +1835,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The refusal or withholding or denial of the existence or applicability of rights" + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Rights" + "@value": "Rights Exercise Prevented" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2059,6 +1878,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N877aeaa00e28404d96212fa2798843da" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2066,7 +1890,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2078,48 +1902,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Financial Loss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "_:N877aeaa00e28404d96212fa2798843da", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2128,7 +1945,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2137,43 +1954,48 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Individual Health & Safety" } ] }, { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2195,7 +2017,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2205,30 +2027,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Concept representing Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628", "@type": [ "https://schema.org/WebPage" ], @@ -2244,13 +2072,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", + "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2289,93 +2117,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confirmation Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ReverseDiscrimination", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + "@value": "Rule-Based System Design" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Reverse Discrimination" + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", "@type": [ - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2385,7 +2167,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2397,64 +2179,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2464,7 +2213,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2476,40 +2225,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Legal Risk Concept" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#PublicServicesExclusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2517,7 +2264,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2529,41 +2276,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Public Services Exclusion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2573,7 +2326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2585,23 +2338,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + "@value": "Concept representing Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Response Bias" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2623,7 +2393,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2633,56 +2403,56 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Concept representing Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" + "@value": "Exposure to Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DirectDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#DisproportionateEnergyConsumption", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" @@ -2690,7 +2460,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2700,7 +2470,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2712,24 +2482,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + "@value": "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Direct Discrimination" + "@value": "Disproportionate Energy Consumption" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2740,7 +2510,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2749,6 +2519,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2756,7 +2531,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2768,27 +2543,72 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Concept representing Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } @@ -2807,7 +2627,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2817,7 +2637,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2829,40 +2649,80 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Concept representing Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A consequence related to the provision of a service" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2884,7 +2744,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2894,7 +2754,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2906,57 +2766,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Concept representing Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", + "@id": "https://w3id.org/dpv/risk/owl#ServiceQualityReduced", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2966,7 +2815,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2978,27 +2827,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Aggregation Bias" + "@value": "Service Quality Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk/owl#CustomerSupportLimited", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3006,7 +2860,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3014,16 +2868,28 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing customer support to be limited" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Customer Support Limited" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", + "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3050,7 +2916,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3062,32 +2928,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confounding Variables Bias" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReligiousDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#RightsObstructed", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3095,7 +2955,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3107,41 +2967,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's religious beliefs or practices" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Religious Discrimination" + "@value": "Rights Obstructed" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#DirectDiscrimination", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3151,7 +3006,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3163,30 +3018,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Direct Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Homophobia", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nae5245156caa4c27aeb793246d56954e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3196,7 +3067,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination" + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3208,55 +3079,123 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + "@value": "Concept representing Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Homophobia" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "_:Nae5245156caa4c27aeb793246d56954e", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ + "https://schema.org/url": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and consequences regarding legal compliance and its violation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Compliance Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Earthquake", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The occurence or potential occurence of earthquakes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Earthquake" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#RightsUnfulfilled", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3284,7 +3223,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unfulfilment of Rights" + "@value": "Rights Unfulfilled" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -3295,14 +3234,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" @@ -3326,15 +3263,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@id": "_:N4f06055416a84591bbecd622054f617d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3344,7 +3273,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3356,50 +3285,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", + "@id": "_:N4f06055416a84591bbecd622054f617d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3408,11 +3338,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8626c0b412094a41834e4fa199b449f9" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3420,7 +3345,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3432,65 +3357,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N8626c0b412094a41834e4fa199b449f9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Bias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3498,7 +3387,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3510,41 +3399,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + "@value": "Concept representing Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Bias" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3554,7 +3444,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3566,24 +3456,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + "@value": "Concept representing Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Bias" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3605,7 +3497,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3615,7 +3507,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3627,48 +3519,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Concept representing Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RacialDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3676,7 +3562,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Racism" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3685,35 +3571,22 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Discrimination against individuals because of their racial background or skin color" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Racial Discrimination" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GeographicDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3721,7 +3594,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3733,35 +3606,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's geographical origin or residence" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Geographic Discrimination" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -3770,11 +3643,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3782,7 +3650,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3794,63 +3662,63 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Compensation" } ] }, { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#Transphobia", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3860,7 +3728,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3872,57 +3740,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", + "@id": "https://w3id.org/dpv/risk/owl#ServiceAlternativeOffered", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3932,7 +3773,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3944,41 +3785,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Group Attribution Bias" + "@value": "Service Alternative Offered" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#SexDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3988,7 +3818,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4000,52 +3830,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Sex Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#DisabilityDiscrimination", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4055,7 +3863,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4067,46 +3875,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Disability Discrimination" } ] }, { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimited", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AgeDiscrimination", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4116,7 +3919,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4128,26 +3931,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's age, often impacting older or younger individuals" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Age Discrimination" + "@value": "Rights Limited" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToEstablishLegalClaims", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4155,7 +3970,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4164,43 +3979,44 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Inability to Establish Legal Claims" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4210,10 +4026,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4225,51 +4038,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" - }, - { - "@language": "en", - "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4279,7 +4082,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4291,41 +4094,78 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", + "@id": "https://w3id.org/dpv/risk/owl#Floods", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The occurence or potential occurence of floods" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Floods" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4345,41 +4185,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Organisational Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Organisational in this context refers to an organisation which is not human but is managed by humans" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4389,7 +4240,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4401,26 +4252,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + "@value": "Concept representing Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Out-Group Homogeneity Bias" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DelayedApplicationProcessing", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4428,7 +4301,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Misuse" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4440,23 +4313,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Concept representing delayed processing of applications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Delayed Application Processing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", + "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], @@ -4484,7 +4357,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4496,46 +4369,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Simpson'S Paradox Bias" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#AgeDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4545,7 +4402,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4557,45 +4414,80 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Age Discrimination" } ] }, { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", + "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], @@ -4618,7 +4510,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" + "@id": "_:N1abbefd32bc845a7880d7b75d2794630" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4628,7 +4520,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4640,91 +4532,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Concept representing Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Extorsion" } ] }, { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", + "@id": "_:N1abbefd32bc845a7880d7b75d2794630", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Racism", + "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Prejudice or discrimination against people based on their race" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Racism" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4751,7 +4592,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4763,41 +4604,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Processing Bias" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4807,7 +4636,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4819,31 +4648,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." + "@value": "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Violating Obligation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4865,7 +4687,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4875,7 +4697,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4887,50 +4709,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Concept representing Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Lose of Trust" } ] }, { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -4939,11 +4762,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4951,108 +4769,49 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#Compensation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Concept representing benefits - both material and immaterial" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" + "@value": "Benefit" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Physical Harm" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Reward", - "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5062,7 +4821,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5074,21 +4833,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Societal Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -5101,7 +4867,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -5110,11 +4876,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5122,7 +4883,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5134,40 +4895,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Concept representing Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CasteDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#ExcellenceDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -5195,24 +4946,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Caste Discrimination" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EthnicDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#ReligiousDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -5228,7 +4979,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Racism" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5240,92 +4991,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + "@value": "Discrimination based on a person's religious beliefs or practices" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ethnic Discrimination" + "@value": "Religious Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Bias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cognitive Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5336,7 +5031,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932" + "@id": "_:Ndede7eca20f8479483447fce78fdad36" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5358,18 +5053,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Concept representing Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932", + "@id": "_:Ndede7eca20f8479483447fce78fdad36", "@type": [ "https://schema.org/WebPage" ], @@ -5385,21 +5080,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndirectDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#SexualHarassment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5407,7 +5096,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5416,30 +5105,22 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Indirect Discrimination" + "@value": "Sexual Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5449,7 +5130,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5461,30 +5142,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Concept representing Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5494,7 +5192,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5506,25 +5204,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "SexualOrientation Discrimination" + "@value": "Requirements Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5546,7 +5249,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5556,7 +5259,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5568,57 +5271,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Human Errors" } ] }, { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#PersonalisationDisabled", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5628,7 +5320,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5640,62 +5332,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Personalisation Disabled" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5717,7 +5403,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6" + "@id": "_:N415855303c6a4ae18e62e54d5a894a07" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5727,125 +5413,93 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Concept representing Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" + "@value": "Violating Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6", + "@id": "_:N415855303c6a4ae18e62e54d5a894a07", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Financial Impact" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5857,18 +5511,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Concept representing Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece", "@type": [ "https://schema.org/WebPage" ], @@ -5884,13 +5538,48 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#Harassment", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Harm" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Harassment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5901,7 +5590,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -5910,6 +5599,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5917,7 +5611,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5929,34 +5623,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Concept representing Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Malware Attack" + } + ] + }, + { + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@id": "https://w3id.org/dpv/risk/owl#ServiceProvided", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5964,7 +5672,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5976,41 +5684,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Service Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Naca18964036346eea3a9e385d3a0bc12" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6020,7 +5734,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6032,36 +5746,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs in or during requirements creation" + "@value": "Concept representing System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Requirements Bias" + "@value": "System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misandry", + "@id": "_:Naca18964036346eea3a9e385d3a0bc12", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Neca6b5963bf24a948454cd84f743913d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6071,7 +5818,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6083,241 +5830,236 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against men" + "@value": "Concept representing Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misandry" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "_:Neca6b5963bf24a948454cd84f743913d", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "https://schema.org/name": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "https://schema.org/url": [ { - "@id": "http://www.w3.org/2002/07/owl" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Axel Polleres" - }, + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Delaram Golpayegani" - }, + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ { - "@value": "Beatriz Esteves" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "2022-08-14" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Rob Brennan" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/hasVersion": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "_:Na6fecbc205414992aba88eb2c49114fb" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "2024-08-18" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "Concept representing Sexual Violence" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "10.5281/zenodo.12505841" + "@language": "en", + "@value": "Sexual Violence" } + ] + }, + { + "@id": "_:Na6fecbc205414992aba88eb2c49114fb", + "@type": [ + "https://schema.org/WebPage" ], - "http://purl.org/ontology/bibo/status": [ + "https://schema.org/name": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "https://schema.org/url": [ { - "@value": "risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://w3id.org/dpv/risk#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "RISK" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/source": [ { - "@value": "2.1-dev" + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + "@id": "https://w3id.org/dpv/examples/owl#E0069" }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, + "@id": "https://w3id.org/dpv/examples/owl#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/primer" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/owl" - }, + "@language": "en", + "@value": "Concept representing Data Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Data Breach" } + ] + }, + { + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6339,7 +6081,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6361,18 +6103,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Concept representing Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66", "@type": [ "https://schema.org/WebPage" ], @@ -6388,15 +6130,32 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity", + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6404,7 +6163,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6416,43 +6175,2288 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Activity" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" } ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Implicit Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Social Disadvantage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Social Disadvantage" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rights Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N889cd521927340be8913f31c0baa2b9b" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Copyright Violation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Copyright Violation" + } + ] + }, + { + "@id": "_:N889cd521927340be8913f31c0baa2b9b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#", + "@type": [ + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Daniel Doherty" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Rob Brennan" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Blackmail" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Blackmail" + } + ] + }, + { + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Spoofing" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Spoofing" + } + ] + }, + { + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N985d9d3940a5494c898615fbbabe81ef" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised System Access" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised System Access" + } + ] + }, + { + "@id": "_:N985d9d3940a5494c898615fbbabe81ef", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalSupportLimited", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Support Limited" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoyaltyProgramExclusion", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Loyalty Program Exclusion" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Code Disclosure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Code Disclosure" + } + ] + }, + { + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0673a500160d458fb2189ffe9f6498fa" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Harm" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Psychological Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Psychological Harm" + } + ] + }, + { + "@id": "_:N0673a500160d458fb2189ffe9f6498fa", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Misogyny", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Sexism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Dislike, contempt, or prejudice against women" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Misogyny" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#GeographicDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's geographical origin or residence" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Geographic Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ServicePartiallyProvided", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Service Partially Provided" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Racism", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Prejudice or discrimination against people based on their race" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Racism" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Public Order Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Public Order Breach" + } + ] + }, + { + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confounding Variables Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and consequences regarding policy and its associated processes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Policy Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing violation of policy which can be either internal or external policy" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violating Policy" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReverseDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reverse Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndirectDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Indirect Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Bias", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" + } + ] + }, + { + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndfdabe58832a445293583eabfe4518fb" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unwanted Code Deletion" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unwanted Code Deletion" + } + ] + }, + { + "@id": "_:Ndfdabe58832a445293583eabfe4518fb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#InabilityToProtectVitalInterests", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Protect Vital Interests" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "SexualOrientation Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Homophobia", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Homophobia" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsEroded", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The gradual weakening or reduction of the scope and protection of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rights Eroded" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RacialDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Racism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals because of their racial background or skin color" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Racial Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Information Disclosure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Information Disclosure" + } + ] + }, + { + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6460,7 +8464,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6472,31 +8476,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6507,7 +8505,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6516,6 +8514,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6535,53 +8538,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Concept representing Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6591,7 +8593,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6603,40 +8605,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6658,7 +8647,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6668,7 +8657,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6680,18 +8669,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Concept representing Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Security Breach" } ] }, { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4", "@type": [ "https://schema.org/WebPage" ], @@ -6707,147 +8696,92 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "In-Group Bias" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@id": "https://w3id.org/dpv/examples" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Payment" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" + "@language": "en", + "@value": "ISO 20501:2019" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6857,7 +8791,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6869,40 +8803,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" - } - ] - }, - { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Statistical Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", + "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6929,7 +8847,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6941,31 +8859,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Rule-Based System Design" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6987,7 +8898,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" + "@id": "_:N597e8421bc334907aef6fa116a95a520" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6997,7 +8908,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7009,96 +8920,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Concept representing Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", + "@id": "_:N597e8421bc334907aef6fa116a95a520", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightObstructed", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Interference with or blocking of the exercise of rights" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Obstruction of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -7107,11 +8973,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6177ab61947545c3b0f993f924c70c28" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7119,7 +8980,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7131,46 +8992,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Concept representing Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Detriment" } ] }, { - "@id": "_:N6177ab61947545c3b0f993f924c70c28", + "@id": "https://w3id.org/dpv/risk/owl#DataBias", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7179,7 +9036,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7191,26 +9048,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Data Bias" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7232,7 +9089,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1" + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7254,7 +9111,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Concept representing Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ @@ -7265,7 +9122,7 @@ ] }, { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1", + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9", "@type": [ "https://schema.org/WebPage" ], @@ -7281,52 +9138,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Societal Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", - "@type": [ "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7353,7 +9171,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7365,27 +9183,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Reward" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7407,7 +9223,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7429,18 +9245,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Concept representing Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9", "@type": [ "https://schema.org/WebPage" ], @@ -7456,19 +9272,80 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sexism", + "@id": "https://w3id.org/dpv/risk/owl#EthnicDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Racism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Ethnic Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@type": [ "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7478,7 +9355,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7490,105 +9367,87 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" + "@value": "Concept representing Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexism" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#CasteDiscrimination", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Caste Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", + "@id": "https://w3id.org/dpv/risk/owl#RightsDenied", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7596,7 +9455,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7608,25 +9467,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + "@value": "The refusal or withholding or denial of the existence or applicability of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coverage Bias" + "@value": "Rights Denied" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7636,7 +9500,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#Misuse" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7648,32 +9512,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Concept represent an intentional misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7681,7 +9556,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7690,22 +9565,29 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7727,7 +9609,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7737,7 +9619,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7749,40 +9631,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Concept representing System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "System Intrusion" } ] }, { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", + "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7809,46 +9691,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Selection Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7860,43 +9703,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7904,7 +9732,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7916,26 +9744,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Concept representing an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7957,7 +9786,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" + "@id": "_:N76a6ce1a060d4760be82a172d993465b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7967,7 +9796,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7979,18 +9808,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Concept representing a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Compromise Account" } ] }, { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", + "@id": "_:N76a6ce1a060d4760be82a172d993465b", "@type": [ "https://schema.org/WebPage" ], @@ -8006,38 +9835,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#Sexism", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nedb073eb260845019e04df25c90d654e" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8047,7 +9857,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8059,63 +9869,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" - } - ] - }, - { - "@id": "_:Nedb073eb260845019e04df25c90d654e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A consequence that is legally relevant i.e. actionable under law" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" + "@language": "en", + "@value": "Legally Relevant Consequence" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8124,7 +9936,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8136,40 +9948,73 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Concept representing Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToProcessPayments", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Process Payments" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8192,7 +10037,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8202,30 +10047,39 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Concept representing Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Violating Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98", "@type": [ "https://schema.org/WebPage" ], @@ -8241,35 +10095,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndd18bed776ec45498b139828923f57f1" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8279,7 +10118,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8291,42 +10130,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:Ndd18bed776ec45498b139828923f57f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Technical Risk Concept" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8334,7 +10181,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Misuse" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8346,23 +10193,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Concept representing Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8384,7 +10239,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8394,58 +10249,51 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Concept representing Unauthorised Data Access" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8468,7 +10316,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nadd5922c22574bd38879939155a85ae3" + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8478,7 +10326,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8490,67 +10338,45 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Concept representing Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nadd5922c22574bd38879939155a85ae3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Violence against children" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", + "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], @@ -8568,7 +10394,7 @@ "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "ISO 20501:2019" + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8578,7 +10404,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8590,46 +10416,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Statistical Bias" + "@value": "Non-Response Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#NationalityDiscrimination", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8639,7 +10449,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8651,38 +10461,22 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Discrimination based on a person's nationality or citizenship" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" - } - ] - }, - { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Nationality Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", @@ -8707,7 +10501,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N636eafbaa808469aa226aaa74ca74855" + "@id": "_:N61b2a56f52954abdab1d5175aec3c012" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8717,36 +10511,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Concept representing Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" + "@value": "Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N636eafbaa808469aa226aaa74ca74855", + "@id": "_:N61b2a56f52954abdab1d5175aec3c012", "@type": [ "https://schema.org/WebPage" ], @@ -8762,14 +10556,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8791,7 +10584,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8801,7 +10594,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8813,41 +10606,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Concept representing Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Physical Assault" } ] }, { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk/owl#ServiceProvisionDelayed", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8855,7 +10655,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8867,113 +10667,149 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Service Provision Delayed" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolated", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rights Violated" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@id": "https://w3id.org/dpv/risk/owl#Misuse" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "accepted" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Concept representing accidental misuse (of something)" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@language": "en", + "@value": "Accidental Misuse" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "accepted" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Sampling Bias" + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8982,7 +10818,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8994,47 +10830,62 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Concept representing Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Confidentiality Breach" + } + ] + }, + { + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9044,7 +10895,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9056,31 +10907,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + "@value": "Concept representing Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Normality Bias" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GenderDiscrimination", + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9089,7 +10950,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9101,26 +10962,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's gender identity or gender expression" + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Gender Discrimination" + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualHarassment", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0bcefedd768f46769c68ec31fad757da" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9128,7 +11012,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9137,53 +11021,44 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Coercion" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Harassment" + "@value": "Coercion" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "_:N0bcefedd768f46769c68ec31fad757da", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/examples" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9205,7 +11080,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9215,7 +11090,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9227,24 +11102,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Concept representing Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66", "@type": [ "https://schema.org/WebPage" ], @@ -9260,19 +11129,35 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExcellenceDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7acfc235cc254becbaba265d4ea9494e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9282,7 +11167,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9294,41 +11179,63 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" + "@value": "Concept representing Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Excellence Discrimination" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", + "@id": "_:N7acfc235cc254becbaba265d4ea9494e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9338,7 +11245,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9350,24 +11257,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + "@value": "Concept representing Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Implicit Bias" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9389,7 +11311,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N60882207c25442eab9509dc96896d91a" + "@id": "_:N37a077a62e9c415d99face23df8fac51" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9399,30 +11321,39 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Concept representing Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Violating Legal Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N60882207c25442eab9509dc96896d91a", + "@id": "_:N37a077a62e9c415d99face23df8fac51", "@type": [ "https://schema.org/WebPage" ], @@ -9438,70 +11369,44 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Unauthorised Re-Identification" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", + "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9528,7 +11433,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9540,26 +11445,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Informativeness Bias" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9581,7 +11485,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9591,7 +11495,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9603,46 +11507,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Concept representing Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Transphobia", + "@id": "https://w3id.org/dpv/risk/owl#ServiceSecurityReduced", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9652,7 +11556,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9664,49 +11568,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Transphobia" + "@value": "Service Security Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9714,7 +11593,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9726,61 +11605,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#Misandry", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9790,100 +11638,48 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@language": "en", + "@value": "Dislike, contempt, or prejudice against men" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Misandry" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -9892,6 +11688,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9899,75 +11700,58 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A limitation or restrictions on the scope or exercise of rights" + "@value": "Concept representing Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Intercept Communications" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harassment", + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Harassment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9989,7 +11773,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N58c7a823728a4bbc929c09b50030b836" + "@id": "_:N6f377135bda24668a1071c5670204b53" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9999,7 +11783,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10011,18 +11795,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Concept representing Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N58c7a823728a4bbc929c09b50030b836", + "@id": "_:N6f377135bda24668a1071c5670204b53", "@type": [ "https://schema.org/WebPage" ], @@ -10038,19 +11822,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LanguageDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#IdentityVerificationFailure", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10060,7 +11844,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10072,47 +11856,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" + "@value": "Concept representing failure to verify identity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Language Discrimination" + "@value": "Identity Verification Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToEnterIntoContract", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N45e627abb33f484ea319253eb043bcd9" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10122,7 +11889,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10134,65 +11901,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:N45e627abb33f484ea319253eb043bcd9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Inability to Enter Into Contract" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#LanguageDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N01f7495831e241abad48b454e2462d19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10202,7 +11934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10214,41 +11946,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N01f7495831e241abad48b454e2462d19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Language Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10270,7 +11984,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" + "@id": "_:Na801ef084cf6488facf5802801e4ce8b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10280,36 +11994,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Concept representing Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", + "@id": "_:Na801ef084cf6488facf5802801e4ce8b", "@type": [ "https://schema.org/WebPage" ], @@ -10325,62 +12039,40 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@value": "Delaram Golpayegani" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-06-11" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Discrimination based on a person's biological sex" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Sex Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10392,25 +12084,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Concept representing a misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10432,7 +12123,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N70af67194f054cbcbe4d1d616683423b" + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10442,7 +12133,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10454,29 +12145,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Concept representing Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N70af67194f054cbcbe4d1d616683423b", + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] } diff --git a/2.1-dev/risk/modules/risk_taxonomy-owl.n3 b/2.1-dev/risk/modules/risk_taxonomy-owl.n3 index 1dc03ef44..f561c65db 100644 --- a/2.1-dev/risk/modules/risk_taxonomy-owl.n3 +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.n3 @@ -24,7 +24,7 @@ risk-owl:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:prefLabel "Accidental Misuse"@en . risk-owl:AgeDiscrimination a rdfs:Class, @@ -56,7 +56,7 @@ risk-owl:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, @@ -82,8 +82,9 @@ risk-owl:Benefit a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes benefits"@en ; - skos:prefLabel "Benefit"@en . + skos:definition "Concept representing benefits - both material and immaterial"@en ; + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk-owl:Bias a rdfs:Class, owl:Class, @@ -95,7 +96,7 @@ risk-owl:Bias a rdfs:Class, dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:prefLabel "Bias"@en . @@ -116,7 +117,7 @@ risk-owl:Blackmail a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, @@ -135,7 +136,7 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . risk-owl:CasteDiscrimination a rdfs:Class, @@ -167,7 +168,7 @@ risk-owl:Coercion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:CognitiveBias a rdfs:Class, @@ -210,7 +211,7 @@ risk-owl:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -224,7 +225,7 @@ risk-owl:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -246,7 +247,7 @@ risk-owl:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, @@ -265,7 +266,7 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, @@ -284,7 +285,7 @@ risk-owl:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . risk-owl:ConfirmationBias a rdfs:Class, @@ -329,9 +330,10 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:definition "Concept representing Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . risk-owl:CoverageBias a rdfs:Class, @@ -364,9 +366,22 @@ risk-owl:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . +risk-owl:CustomerSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:prefLabel "Customer Support Limited"@en . + risk-owl:Damage a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -377,9 +392,9 @@ risk-owl:Damage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:definition "Concept representing Damage"@en ; skos:prefLabel "Damage"@en . risk-owl:DataAggregationBias a rdfs:Class, @@ -432,7 +447,7 @@ risk-owl:DataBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, @@ -451,7 +466,7 @@ risk-owl:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -470,6 +485,19 @@ risk-owl:DataProcessingBias a rdfs:Class, skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; skos:prefLabel "Data Processing Bias"@en . +risk-owl:DelayedApplicationProcessing a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:prefLabel "Delayed Application Processing"@en . + risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -485,21 +513,22 @@ risk-owl:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:Detriment a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:definition "Concept representing Detriment"@en ; skos:prefLabel "Detriment"@en . risk-owl:DirectDiscrimination a rdfs:Class, @@ -530,23 +559,31 @@ risk-owl:DisabilityDiscrimination a rdfs:Class, risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk, risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:prefLabel "Discrimination"@en . +risk-owl:DisproportionateEnergyConsumption a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -562,18 +599,32 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk-owl:EnvironmentalRisk a rdfs:Class, +risk-owl:Earthquake a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:prefLabel "Earthquake"@en . + +risk-owl:EnvironmentalRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; + sw:term_status "accepted"@en ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:prefLabel "Environmental Risk"@en . @@ -593,7 +644,7 @@ risk-owl:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -613,11 +664,11 @@ risk-owl:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:ErroneousSystemUse a rdfs:Class, +risk-owl:ErroneousUse a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -632,8 +683,8 @@ risk-owl:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:prefLabel "Erroneous System Use"@en . + skos:definition "Concept representing erroneous use (of something)"@en ; + skos:prefLabel "Erroneous Use"@en . risk-owl:EthnicDiscrimination a rdfs:Class, owl:Class, @@ -674,9 +725,9 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:definition "Concept representing Harmful Speech"@en ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -685,7 +736,7 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, dpv-owl:RiskConcept, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:prefLabel "External Security Threat"@en . @@ -706,7 +757,7 @@ risk-owl:Extorsion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:FinancialImpact a rdfs:Class, @@ -715,8 +766,9 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:prefLabel "Financial Impact"@en . @@ -736,9 +788,22 @@ risk-owl:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . +risk-owl:Floods a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:prefLabel "Floods"@en . + risk-owl:Fraud a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -755,7 +820,7 @@ risk-owl:Fraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:prefLabel "Fraud"@en . risk-owl:GenderDiscrimination a rdfs:Class, @@ -799,6 +864,18 @@ risk-owl:GroupAttributionBias a rdfs:Class, skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; skos:prefLabel "Group Attribution Bias"@en . +risk-owl:GroupRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:prefLabel "Societal Risk"@en . + risk-owl:Harassment a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -822,7 +899,7 @@ risk-owl:Harm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -854,7 +931,7 @@ risk-owl:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:prefLabel "Human Errors"@en . risk-owl:IdentityFraud a rdfs:Class, @@ -873,7 +950,7 @@ risk-owl:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, @@ -892,9 +969,22 @@ risk-owl:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . +risk-owl:IdentityVerificationFailure a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:prefLabel "Identity Verification Failure"@en . + risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -907,9 +997,9 @@ risk-owl:IllegalDataProcessing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -943,6 +1033,84 @@ risk-owl:InGroupBias a rdfs:Class, skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; skos:prefLabel "In-Group Bias"@en . +risk-owl:InabilityToEnterIntoContract a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk-owl:InabilityToEstablishLegalClaims a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk-owl:InabilityToFulfillLegalObligations a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk-owl:InabilityToProcessPayments a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Process Payments"@en . + +risk-owl:InabilityToProtectVitalInterests a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk-owl:InabilityToProvideHealthCare a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk-owl:IndirectDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -969,10 +1137,12 @@ risk-owl:IndividualHealthSafety a rdfs:Class, risk-owl:IndividualRisk a rdfs:Class, owl:Class, + dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . @@ -1007,7 +1177,7 @@ risk-owl:Injury a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, @@ -1030,7 +1200,7 @@ risk-owl:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, @@ -1049,7 +1219,7 @@ risk-owl:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1090,16 +1260,56 @@ risk-owl:LanguageDiscrimination a rdfs:Class, skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; skos:prefLabel "Language Discrimination"@en . -risk-owl:LegalRisk a rdfs:Class, +risk-owl:LegalComplianceRisk a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk-owl:LegalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:prefLabel "Legal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk-owl:LegalSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Legal Support Limited"@en . + +risk-owl:LegallyRelevantConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:prefLabel "Legally Relevant Consequence"@en . risk-owl:LoseCredibility a rdfs:Class, owl:Class, @@ -1116,7 +1326,7 @@ risk-owl:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:prefLabel "Lose of Credibility"@en . risk-owl:LoseCustomerConfidence a rdfs:Class, @@ -1134,7 +1344,7 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:prefLabel "Lose of Customer Confidence"@en . risk-owl:LoseGoodwill a rdfs:Class, @@ -1152,7 +1362,7 @@ risk-owl:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:prefLabel "Lose of Goodwill"@en . risk-owl:LoseNegotiatingCapacity a rdfs:Class, @@ -1170,7 +1380,7 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk-owl:LoseOpportunity a rdfs:Class, @@ -1188,7 +1398,7 @@ risk-owl:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:prefLabel "Lose of Opportunity"@en . risk-owl:LoseReputation a rdfs:Class, @@ -1206,7 +1416,7 @@ risk-owl:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:prefLabel "Lose of Reputation"@en . risk-owl:LoseTrust a rdfs:Class, @@ -1224,9 +1434,22 @@ risk-owl:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:prefLabel "Lose of Trust"@en . +risk-owl:LoyaltyProgramExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk-owl:MaliciousActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1256,7 +1479,7 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, @@ -1276,7 +1499,7 @@ risk-owl:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, @@ -1289,9 +1512,9 @@ risk-owl:MaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:definition "Concept representing Material Damage"@en ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1333,7 +1556,7 @@ risk-owl:Misuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:prefLabel "Misuse"@en . risk-owl:NationalityDiscrimination a rdfs:Class, @@ -1359,9 +1582,9 @@ risk-owl:NonMaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1401,11 +1624,26 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OrganisationalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk-owl:OutGroupHomogeneityBias a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -1449,11 +1687,37 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . +risk-owl:PersonalisationDisabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Disabled"@en . + +risk-owl:PersonalisationEnabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Enabled"@en . + risk-owl:PhishingScam a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1470,7 +1734,7 @@ risk-owl:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, @@ -1488,7 +1752,7 @@ risk-owl:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, @@ -1502,6 +1766,17 @@ risk-owl:PhysicalHarm a rdfs:Class, sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . +risk-owl:PolicyRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:prefLabel "Policy Risk"@en . + risk-owl:Privacy a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1528,7 +1803,7 @@ risk-owl:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, @@ -1543,11 +1818,24 @@ risk-owl:PublicOrderBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:definition "Concept representing Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . +risk-owl:PublicServicesExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Public Services Exclusion"@en . + risk-owl:RacialDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -1587,7 +1875,7 @@ risk-owl:Reidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -1626,7 +1914,7 @@ risk-owl:ReputationalRisk a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . @@ -1675,20 +1963,7 @@ risk-owl:Reward a rdfs:Class, skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . -risk-owl:RightEroded a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept, - risk-owl:PotentialConsequence, - risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RightsImpact ; - sw:term_status "accepted"@en ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk-owl:RightObstructed a rdfs:Class, +risk-owl:RightsDenied a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1697,11 +1972,11 @@ risk-owl:RightObstructed a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsDenial a rdfs:Class, +risk-owl:RightsEroded a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1710,11 +1985,11 @@ risk-owl:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsExercisePrevention a rdfs:Class, +risk-owl:RightsExercisePrevented a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1727,7 +2002,7 @@ risk-owl:RightsExercisePrevention a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, @@ -1743,13 +2018,13 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en ; + skos:definition "Concept representing Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsLimitation a rdfs:Class, +risk-owl:RightsLimited a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1762,9 +2037,22 @@ risk-owl:RightsLimitation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk-owl:RightsObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsUnfulfilled a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1775,10 +2063,10 @@ risk-owl:RightsUnfulfilled a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsViolation a rdfs:Class, +risk-owl:RightsViolated a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1791,7 +2079,7 @@ risk-owl:RightsViolation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RuleBasedSystemDesign a rdfs:Class, @@ -1827,7 +2115,7 @@ risk-owl:Sabotage a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:SamplingBias a rdfs:Class, @@ -1861,7 +2149,7 @@ risk-owl:Scam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, @@ -1875,7 +2163,7 @@ risk-owl:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, @@ -1896,7 +2184,7 @@ risk-owl:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:prefLabel "Security Breach"@en . risk-owl:SelectionBias a rdfs:Class, @@ -1914,6 +2202,161 @@ risk-owl:SelectionBias a rdfs:Class, skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; skos:prefLabel "Selection Bias"@en . +risk-owl:ServiceAlternativeOffered a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Alternative Offered"@en . + +risk-owl:ServiceCostIncreased a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Cost Increased"@en . + +risk-owl:ServiceDenied a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Denied"@en . + +risk-owl:ServiceLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Limited"@en . + +risk-owl:ServiceNotProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Not Provided"@en . + +risk-owl:ServicePartiallyProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Partially Provided"@en . + +risk-owl:ServiceProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provided"@en . + +risk-owl:ServiceProvisionDelayed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provision Delayed"@en . + +risk-owl:ServiceQualityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Quality Reduced"@en . + +risk-owl:ServiceRelatedConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence related to the provision of a service"@en . + +risk-owl:ServiceSecurityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Security Reduced"@en . + +risk-owl:ServiceTermination a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Termination"@en . + risk-owl:SexDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -1979,7 +2422,7 @@ risk-owl:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:SimpsonsParadoxBias a rdfs:Class, @@ -2007,9 +2450,9 @@ risk-owl:SocialDisadvantage a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . risk-owl:SocietalBias a rdfs:Class, @@ -2034,21 +2477,24 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Societal Health & Safety"@en . -risk-owl:SocietalRisk a rdfs:Class, +risk-owl:SocietalRiskConcept a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:prefLabel "Societal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk-owl:Spoofing a rdfs:Class, owl:Class, @@ -2067,7 +2513,7 @@ risk-owl:Spoofing a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:prefLabel "Spoofing"@en . risk-owl:StatisticalBias a rdfs:Class, @@ -2101,7 +2547,7 @@ risk-owl:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -2122,7 +2568,7 @@ risk-owl:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, @@ -2141,10 +2587,25 @@ risk-owl:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk-owl:TechnicalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk-owl:Terrorism a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -2158,9 +2619,9 @@ risk-owl:Terrorism a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:definition "Concept representing Terrorism"@en ; skos:prefLabel "Terrorism"@en . risk-owl:Transphobia a rdfs:Class, @@ -2194,7 +2655,7 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, @@ -2209,7 +2670,7 @@ risk-owl:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, @@ -2229,7 +2690,7 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, @@ -2248,7 +2709,7 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, @@ -2267,7 +2728,7 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, @@ -2286,7 +2747,7 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, @@ -2305,7 +2766,7 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, @@ -2324,7 +2785,7 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, @@ -2343,7 +2804,7 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, @@ -2359,7 +2820,7 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, @@ -2378,7 +2839,7 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, @@ -2398,7 +2859,7 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, @@ -2417,7 +2878,7 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, @@ -2437,7 +2898,7 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, @@ -2457,7 +2918,7 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, @@ -2476,7 +2937,7 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, @@ -2485,7 +2946,7 @@ risk-owl:UserRisks a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:prefLabel "User Risks"@en . @@ -2502,9 +2963,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -2520,10 +2981,11 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk-owl:ViolatingEthicsCode a rdfs:Class, @@ -2538,9 +3000,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -2556,23 +3018,48 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk-owl:ViolatingObligation a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Obligation"@en . + risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . +risk-owl:ViolatingProhibition a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Prohibition"@en . + risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -2585,10 +3072,11 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk-owl:ViolenceAgainstChildren a rdfs:Class, @@ -2606,7 +3094,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/modules/risk_taxonomy-owl.rdf b/2.1-dev/risk/modules/risk_taxonomy-owl.rdf index f350cacd1..e9ebdc091 100644 --- a/2.1-dev/risk/modules/risk_taxonomy-owl.rdf +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.rdf @@ -12,3089 +12,3614 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - Re-identification + - + - - + - Something that acts as or causes Re-identification - 2022-08-19 - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - Harshvardhan J. Pandit + Stub + Legal Support Limited accepted - 2024-08-16 - + 2024-10-21 + - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - 2022-08-17 - - - - - - modified - 2024-08-16 - Something that acts as or causes Violation of Statutory Obligations - Harshvardhan J. Pandit + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Violation of Statutory Obligations - - - - - 2024-08-16 - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Data Access - - - + Societal Bias - - - - 2022-08-17 - - accepted - Unauthorised Data Access - - - - - - - - - - - accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - 2024-09-13 - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - ISO/IEC 24027:2021 - - - - 2024-09-13 - + - - - Informativeness Bias - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group ISO/IEC 24027:2021 - accepted - - - - - - - - - - - - Out-Group Homogeneity Bias - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society 2024-09-13 accepted - ISO/IEC 24027:2021 - - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - 2024-08-16 - + + accepted + Policy Risk + Risks and consequences regarding policy and its associated processes + - - Harshvardhan J. Pandit - accepted - This concept was called "IllegalProcessingData" in DPV 2.0 - 2022-08-17 - + - - Here equipment refers to physical equipment - Equipment Failure - + + - + - + ISO/IEC 24027:2021 + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + 2024-09-13 accepted - Something that acts as or causes Equipment Failure - Harshvardhan J. Pandit - - 2024-08-16 - 2022-08-17 - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Group Attribution Bias + - - 2024-08-16 - + + 2024-09-13 + + - - - + - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group accepted - 2022-08-17 - Harshvardhan J. Pandit - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 + Informativeness Bias + - - - + + - + - - + - Something that acts as or causes Unwanted Code Deletion - 2024-08-16 - accepted + Concept representing Loss of Opportunity + + 2024-08-16 + Lose of Opportunity 2022-08-17 + Harshvardhan J. Pandit - - Unwanted Code Deletion - + - + + Concept representing Non-Material Damage + - - + + Non-Material Damage 2024-08-16 - + 2022-03-30 Harshvardhan J. Pandit - - Something that acts as or causes Fraud - Fraud - accepted - 2022-08-17 - - - - - - - - - - accepted - Language Discrimination - Discrimination based on a person's language, often linked to national origin or ethnicity - 2024-09-30 - + The criteria for what is considered material damage is based in jurisdictional laws and norms + - - - - Harshvardhan J. Pandit - Here equipment refers to physical equipment - + - - - - - 2022-08-17 - Equipment Malfunction - accepted - Something that acts as or causes Equipment Malfunction - 2024-08-16 - - - - + - - - - - Obstruction of Rights - Interference with or blocking of the exercise of rights - accepted - In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - - - - - - - - - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - 2024-09-13 - ISO/IEC 24027:2021 - Bias + Service Provision Delayed + 2024-10-21 + Stub - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted - + - - 2022-08-17 + accepted - - - - - - - - Identity Fraud - - Something that acts as or causes Identity Fraud - Harshvardhan J. Pandit - 2024-08-16 - - - - accepted + - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - - + Individual Health & Safety + - - - - - - Risk Concepts - N3 serialiation - + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - - accepted - - + - + + + - 2024-09-30 - Homophobia - Hostility or prejudice against individuals who are or are perceived to be homosexual + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + accepted + Discrimination - + Georg P. Krog + 2024-09-30 + - - modified - + + + + + http://www.w3.org/2004/02/skos/core + http://www.w3.org/2000/01/rdf-schema + + 10.5281/zenodo.12505841 + + + + + + + + + + + + Risk Concepts + https://w3id.org/dpv/risk + Georg P. Krog + Axel Polleres + Beatriz Esteves + Fajar Ekaputra + Delaram Golpayegani + Daniel Doherty + Julian Flake + Harshvardhan J. Pandit + 2.1-dev + + Paul Ryan + Julian Flake + Harshvardhan J. Pandit + Beatriz Esteves + Delaram Golpayegani + Georg P. Krog + Rob Brennan + 2.1-dev + + RISK + risk + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + 2024-08-18 + + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + + 2022-08-14 + + http://purl.org/ontology/bibo/status/published + https://w3id.org/dpv/risk# + + + 2022-08-17 + 2024-08-16 + + + + + This concept was called "IllegalProcessingData" in DPV 2.0 + Concept representing Illegal Processing of Data + Harshvardhan J. Pandit + accepted + Illegal Data Processing + + + + + + + + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 + 2024-09-13 + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + accepted + + + + + + + + - Something that acts as or causes Interception of Communications + 2024-08-16 + 2022-08-17 + Harshvardhan J. Pandit - This concept was called "InterceptionCommunications" in DPV 2.0 + Lose of Reputation + + Concept representing Loss of Reputation + accepted + + + + + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + + + + + + + Rights Violated + accepted + 2022-08-18 + Georg P. Krog, Harshvardhan J. Pandit + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2024-08-16 + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + Harshvardhan J. Pandit + accepted + Concept representing Authorisation Failure + + + + + + + + + Authorisation Failure + + 2024-08-16 2022-08-17 + + + - Intercept Communications + Harshvardhan J. Pandit + + + + + + + + modified + + 2022-08-17 + This concept was called "InterceptionCommunications" in DPV 2.0 2024-08-16 + Concept representing Interception of Communications - + + - + + + 2024-10-21 + Financial Impact + accepted + + Things that cause or have the potential to impact financial resources + + + + + + + - Discrimination based on a person's biological sex + Concept represent an intentional misuse (of something) + accepted - Sex Discrimination + Intentional Misuse + + + + + + + + + accepted - 2024-09-30 - + + 2024-10-21 + Stub + Inability to Protect Vital Interests + - - - 2022-08-17 + + + + + + + + Service Cost Increased + Stub + 2024-10-21 + accepted + + + + Harshvardhan J. Pandit + + + + + + + accepted + + Spoofing + 2022-08-17 + + Concept representing Spoofing + 2024-08-16 + + + + accepted - + + + + - - Something that acts as or causes Cryptojacking + Concept representing Coercion + Coercion 2024-08-16 + 2022-08-17 + + Harshvardhan J. Pandit - Cryptojacking - + - + + Judicial Penalty + + + + - + + accepted + + Something that involves or causes judicial penalties to be paid + + + + + + + + + + + accepted + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Concept representing Component Failure + Component Failure + + + + + + - Non-Response Bias - 2024-09-13 + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - ISO/IEC 24027:2021 - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + 2024-09-13 accepted + Coverage Bias + ISO/IEC 24027:2021 - + + + + + + + + + + accepted + 2022-08-17 + Unauthorised Data Access + 2024-08-16 + Concept representing Unauthorised Data Access + Harshvardhan J. Pandit + + + + + + + + + + + + Here equipment refers to physical equipment + Equipment Malfunction + 2022-08-17 + Harshvardhan J. Pandit + Concept representing Equipment Malfunction + accepted + + + 2024-08-16 + + + + 2024-09-30 + + + + + + + Discrimination based on a person's nationality or citizenship + Nationality Discrimination + accepted + + + + + + + + + + + + 2022-08-17 + + Concept representing Fraud + 2024-08-16 + Harshvardhan J. Pandit + Fraud + accepted + + + + + accepted + + + - - - - - - + 2022-03-30 + Concept representing Damage 2024-08-16 + Damage Harshvardhan J. Pandit - Unauthorised Code Access - 2022-08-17 - Something that acts as or causes Unauthorised Code Access - accepted - + - - + + + Concept representing Sabotage + 2024-08-16 + + + + + + 2022-08-17 + + Harshvardhan J. Pandit + accepted + Sabotage + + + + + + - This concept was called "ChildViolence" in DPV 2.0 + Geographic Discrimination + 2024-09-30 accepted - 2024-08-16 - Something that acts as or causes Child Violence - Harshvardhan J. Pandit - Violence against children - 2022-08-17 - + Discrimination based on a person's geographical origin or residence + - + ISO/IEC 24027:2021 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Sampling Bias - accepted + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + - - Bias that occurs when data records are not collected randomly from the intended population - - - - - - - - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Concepts associated with security threats that are likely to originate externally + Out-Group Homogeneity Bias accepted - External Security Threat - + - - - + - - + - 2022-08-17 - Something that acts as or causes Malicious Code Attack - Harshvardhan J. Pandit - - accepted - Malicious Code Attack - 2024-08-16 - + Risks and issues that arise during operational processes + Operational Security Risk + + - - This concept was called "ViolationCodeConduct" in DPV 2.0 + + + + - - - - modified + This concept was called "ChildViolence" in DPV 2.0 - Something that acts as or causes Violation of Code of Conduct - Harshvardhan J. Pandit - 2024-08-16 - Violating Code of Conduct 2022-08-17 - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + Violence against children + 2024-08-16 + + Harshvardhan J. Pandit + accepted + Concept representing Child Violence + - - Something that acts as or causes Discrimination - Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate - - + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + 2024-09-13 - + + + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + ISO/IEC 24027:2021 accepted - 2022-08-19 - 2024-09-30 - 2024-08-16 - Discrimination - Georg P. Krog - - - + Simpson'S Paradox Bias + - - - - - - - + + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution accepted - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large - - - - - 2022-03-23 - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - Something that acts as or causes Detriment - Detriment + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - - accepted - 2024-08-16 - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + 2024-09-13 + ISO/IEC 24027:2021 + Selection Bias + - + + + + - - - - Physical Harm accepted - + Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + Harshvardhan J. Pandit + 2024-08-16 + 2022-08-17 + Financial Loss + - - Something that acts as or causes an attack on security with the aim of undermining it + - - - - - + + + - - Security Attack + 2024-09-30 + Gender Discrimination accepted - + + Discrimination based on a person's gender identity or gender expression + - - accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + - - + - 2024-09-13 - ISO/IEC 24027:2021 - Non-Normality Bias + accepted + + 2024-08-16 + Concept representing Copyright Violation + 2022-08-17 - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - + Copyright Violation + Harshvardhan J. Pandit + + - - + + + Concept representing Loss of Goodwill + 2022-08-17 + 2024-08-16 + + Lose of Goodwill + Harshvardhan J. Pandit - Judicial Penalty accepted - Something that involves or causes judicial penalties to be paid - + - - - - + + + Harshvardhan J. Pandit + 2024-08-16 + + + - + Here system refers to both hardware and software systems + accepted + 2022-08-17 + + System Malfunction + Concept representing System Malfunction + + + - - Malware Attack - 2024-08-16 Harshvardhan J. Pandit + Violating Code of Conduct + + + + + + modified + Concept representing Violation of Code of Conduct 2022-08-17 - accepted - Something that acts as or causes Malware Attack - + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2024-08-16 + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - - + + 2024-10-21 - Societal Health & Safety + Stub + Service Provided accepted - + - - 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when a human makes an association or assumption based on their mental models and memories - + + Harassment + + - - + - accepted - Implicit Bias - ISO/IEC 24027:2021 - + accepted + - - Harshvardhan J. Pandit + + 2024-08-16 + + modified + Concept representing Corruption of Data + + + - - - - - Sabotage 2022-08-17 - accepted - - Something that acts as or causes Sabotage - - + Harshvardhan J. Pandit + This concept was called "Corruption Data" in DPV 2.0 + Data Corruption + - - - + + Concept representing Unauthorised Code Access + Unauthorised Code Access + Harshvardhan J. Pandit + + + + - + - 2022-03-30 accepted - Something that acts as or causes Damage - Damage - Harshvardhan J. Pandit - 2024-08-16 - + 2022-08-17 + + 2024-08-16 + - - 2024-09-30 + + Georg P. Krog, Harshvardhan J. Pandit + 2024-08-16 + - + - Direct Discrimination - + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee accepted - Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - + 2024-04-14 + Reward + - - + + + - - - + modified + + This concept was called "ViolationEthicalCode" in DPV 2.0 2022-08-17 - Harshvardhan J. Pandit - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - accepted - + 2024-08-16 - + Concept representing Violation of Ethics Code + Harshvardhan J. Pandit + Violating Ethics Code + - + + - - - + - Harshvardhan J. Pandit accepted - 2022-08-17 - Something that acts as or causes Coercion - Coercion - 2024-08-16 - + Concept representing Detriment + 2022-03-23 - - - - - Risk Concepts - JSON-LD serialiation - - - - + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + 2024-08-16 + Detriment + - + + - + + + - + - Something that acts as or causes Loss of Negotiating Capacity + 2024-08-16 + 2022-08-17 accepted - Lose of Negotiating Capacity Harshvardhan J. Pandit - 2024-08-16 - - 2022-08-17 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + Concept representing a compromised account that is then used by the compromiser + Compromise Account + - - - + + Risks and issues that affect or have the potential to affect groups in society + + + - accepted - Judicial Costs - Something that involves or causes judicial costs to be paid - + Societal Risk + - + + + + - + + + accepted + + Customer Support Limited + 2024-10-21 + Concept representing customer support to be limited + + + + + + + + Sexism + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + accepted + + 2024-09-30 + + + + + + + + - 2024-08-16 - Something that acts as or causes Extorsion - 2022-08-17 - - Extorsion + 2024-08-16 + Malicious Code Attack accepted + 2022-08-17 + Harshvardhan J. Pandit - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + Concept representing Malicious Code Attack + - - + + + - - + + + 2022-03-30 + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2024-08-16 + Concept representing Material Damage + Harshvardhan J. Pandit + Material Damage accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - 2024-09-13 - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - Confirmation Bias - ISO/IEC 24027:2021 - - + - - + - - - - + + + - - Something that acts as or causes Spoofing + 2024-10-21 + Stub + Service Security Reduced accepted - 2024-08-16 - Spoofing - 2022-08-17 - Harshvardhan J. Pandit - + - + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + - - accepted + - + - Something that acts as or causes Harm to humans - 2024-08-16 - Harshvardhan J. Pandit - 2022-08-13 - This concept refers to the general abstract notion of harm + accepted - Harm - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + Disproportionate Energy Consumption + 2024-10-21 + - + + - - - + + + - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - 2024-09-13 - Rule-Based System Design - ISO/IEC 24027:2021 - - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + Service Quality Reduced + 2024-10-21 + Stub accepted - Rule based system design also potentially introduces various forms of human cognitive bias - + - - 2022-03-23 + + + + - - - - Something that acts as or causes benefits + SexualOrientation Discrimination - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - 2024-08-16 + 2024-09-30 accepted - Benefit - + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + - - - - + + 2024-09-13 + - - - - + + - 2024-08-16 + Data Bias - Something that acts as or causes a compromised account that is then used by the compromiser - Harshvardhan J. Pandit - 2022-08-17 - Compromise Account accepted - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + - - 2022-08-17 - Something that acts as or causes Unauthorised Code Disclosure - accepted + + + - + - - + - - Unauthorised Code Disclosure - Harshvardhan J. Pandit 2024-08-16 + Harshvardhan J. Pandit + Concept representing Unauthorised Resource Use + 2022-08-17 + Unauthorised Resource Use + accepted - - - 2022-08-17 - Harshvardhan J. Pandit - + - + - - modified - This concept was called "Corruption Data" in DPV 2.0 - Something that acts as or causes Corruption of Data + Violating Legal Obligation + Harshvardhan J. Pandit + modified + Concept representing Violation of Legal Obligations 2024-08-16 - Data Corruption - - - - Something that acts as or causes Injury - accepted + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 - - + + + + - + + + + - 2024-08-16 - Injury + accepted + Identity Fraud + Concept representing Identity Fraud + + 2022-08-17 + 2024-08-16 Harshvardhan J. Pandit - - + - - 2022-08-17 - + + + - + 2024-08-16 - - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - + 2022-08-17 Harshvardhan J. Pandit + Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + Brute Force Authorisations accepted - Financial Loss - + - - Something that acts as or causes Component Malfunction - accepted + + + + - - - + + 2024-08-16 + Concept representing Loss of Customer Confidence + + 2022-08-17 + Lose of Customer Confidence + Harshvardhan J. Pandit + accepted + + + + + + + + - Component Malfunction - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Dislike, contempt, or prejudice against women + accepted - + Misogyny + 2024-09-30 + - - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - - Risk Concepts - Turtle serialiation - - - + https://www.iso.org/standard/75281.html - - - - - + + + - 2024-08-16 - + External Security Threat accepted - Reward - Georg P. Krog, Harshvardhan J. Pandit - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - 2024-04-14 - + Concepts associated with security threats that are likely to originate externally + + - - accepted - - - + - + + + + - - Something that acts as or causes Phishing Scam - Phishing Scam - Harshvardhan J. Pandit - 2024-08-16 + Unauthorised Data Disclosure + accepted + + Concept representing Unauthorised Data Disclosure + 2022-08-17 - + 2024-08-16 + - - 2022-08-17 - Harshvardhan J. Pandit - - - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + The refusal or withholding or denial of the existence or applicability of rights - + + + + Rights Denied + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Something that acts as or causes Scam - 2024-08-16 - Scam - - + - - - + + Bias that occurs in or during requirements creation + + - - - + - - - Something that acts as or causes System Intrusion - 2024-08-16 - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Requirements Bias + 2024-09-13 accepted - 2022-08-17 - System Intrusion - + + ISO/IEC 24027:2021 + Requirements bias also represents occasions for the human cognitive biases to manifest + - + + Harshvardhan J. Pandit + - - - + + - Excellence Discrimination - 2024-09-30 accepted + 2022-08-17 + 2024-08-16 + + Concept representing Denial of Service Attack (DoS) - Favoritism towards individuals deemed more competent or superior, often at the expense of others - + Denial of Service Attack (DoS) + - - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - - + + + + Bias that occurs when data records are not collected randomly from the intended population + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Sampling Bias - accepted 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Societal Bias ISO/IEC 24027:2021 - + accepted + - - + - - - - Something that acts as or causes Sexual Violence - - Sexual Violence - 2024-08-16 - Harshvardhan J. Pandit - accepted - 2022-08-17 - - - - - accepted - Denial of Rights - - - The refusal or withholding or denial of the existence or applicability of rights - The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - + accepted + Sexual Harassment + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - 2022-08-17 - - - - - - accepted - Something that acts as or causes Public Order Breach - Public Order Breach - 2024-08-16 - Harshvardhan J. Pandit - - - - 2024-09-30 + + - - + + 2024-09-13 + ISO/IEC 24027:2021 + In-Group Bias accepted - Discrimination based on a person's nationality or citizenship - Nationality Discrimination - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when showing partiality to one's own group or own characteristics + - - Things that cause or have the potential to impact financial resources + + + - + - + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 + Harshvardhan J. Pandit + Re-identification accepted + Concept representing Re-identification - Financial Impact - + - + + - - - + - - Something that acts as or causes Loss of Goodwill - 2022-08-17 - Lose of Goodwill + Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract + Violating Prohibition + 2024-10-21 accepted - 2024-08-16 - Harshvardhan J. Pandit - + - - accepted - 2022-08-18 - + + Loyalty Program Exclusion + Stub + - + + 2024-10-21 - This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2024-08-16 - Violation of Rights - The infringement or breach of rights in a manner that constitues a 'violation' of those rights - Georg P. Krog, Harshvardhan J. Pandit - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + accepted + - - 2024-08-16 - 2022-08-17 - Harshvardhan J. Pandit - Violation of Legal Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + - - + + + - - Something that acts as or causes Violation of Legal Obligations - modified - - - accepted - - 2022-08-17 - - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Non-Normality Bias + 2024-09-13 + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + + + + Rights Exercise Prevented + Actions or measures that prevent an individual or group from exercising their legal rights. + - + + - Something that acts as or causes Erroneous System Use - Harshvardhan J. Pandit - Erroneous System Use 2024-08-16 + accepted + 2022-08-18 - + Georg P. Krog, Harshvardhan J. Pandit + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + - 2022-08-17 - - - - + + + - accepted + 2024-08-16 - Something that acts as or causes Blackmail Harshvardhan J. Pandit - 2024-08-16 + + accepted + 2022-08-17 + Concept representing Blackmail Blackmail - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - 2022-08-17 - Unauthorised Access to Premises - - - + - + - + + + Concept representing Scam accepted - Something that acts as or causes Unauthorised Access to Premises - Harshvardhan J. Pandit - 2024-08-16 - - - - - - - - - - - + 2024-08-16 - Harshvardhan J. Pandit - - accepted - Human Errors + Scam 2022-08-17 - Something that acts as or causes Human Errors - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + Harshvardhan J. Pandit + - + + accepted - + - - Component Failure - accepted - Something that acts as or causes Component Failure - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + 2024-10-21 + The occurence or potential occurence of earthquakes + Earthquake + - + + + Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + Violating Obligation - + - Risks and issues that arise during operational processes - - Operational Security Risk accepted - + 2024-10-21 + - - Risk Concepts - HTML serialiation - - - - - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - - - - - - - - Risks and issues that affect or have the potential to affect specific individuals - accepted - Individual Risk + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 - + + 2022-08-17 + - - + + + + - 2024-08-16 - - Lose of Trust + Unauthorised Access to Premises Harshvardhan J. Pandit - accepted - 2022-08-17 - Something that acts as or causes Loss of Trust - + 2024-08-16 + Concept representing Unauthorised Access to Premises + + + - - The gradual weakening or reduction of the scope and protection of rights + + + - - + Service Termination + Stub + 2024-10-21 accepted - Erosion of Rights - Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - + - + + 2024-08-16 + This concept was called "HarmfulSpeech" in DPV 2.0 + Harshvardhan J. Pandit + - - SexualOrientation Discrimination - 2024-09-30 + Exposure to Harmful Speech + accepted - Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - + 2022-08-17 + Concept representing Harmful Speech + - - Something that acts as or causes Unwanted Data Deletion - 2024-08-16 - - + + - - + + - - + 2024-08-16 + 2022-08-17 Harshvardhan J. Pandit + Concept representing Unauthorised Information Disclosure + + Unauthorised Information Disclosure + accepted - 2022-08-17 - Unwanted Data Deletion - - Something that acts as or causes Psychological Harm + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + + + + + + + + + + 2022-08-17 + Unauthorised Code Disclosure + Concept representing Unauthorised Code Disclosure + 2024-08-16 Harshvardhan J. Pandit accepted + + + 2022-08-17 - + Harshvardhan J. Pandit + Cryptojacking + - + - - Psychological Harm - 2024-08-16 - + + accepted + 2024-08-16 + Concept representing Cryptojacking + - - + + + - + + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + 2024-09-13 + Bias + accepted + + + + + + + + + Discrimination based on a person's biological sex + 2024-09-30 + accepted - Malicious Activity - Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + Sex Discrimination + + + + + + + + accepted - + + Concepts associated with risks that arise due to User or Human use + User Risks + - + 2024-08-16 + + - - - - 2022-08-17 + Personal Safety Endangerment Harshvardhan J. Pandit - Something that acts as or causes Terrorism + Concept representing Personal Safety Endangerment + + accepted - Terrorism + 2022-08-17 + + + + ENISA Threat Taxonomy 2016 + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + ISO/IEC 24027:2021 + + + + + + + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + Non-Response Bias accepted - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + 2024-09-13 + - + - - - - Something that acts as or causes Unwanted Disclosure of Data + accepted 2024-08-16 - Harshvardhan J. Pandit - Unwanted Disclosure of Data - accepted + + Public Order Breach + Concept representing Public Order Breach 2022-08-17 - + Harshvardhan J. Pandit + - - - - - - Examples for Data Privacy Vocabulary - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - + + Concept representing Unwanted Disclosure of Data + + + - - + + Harshvardhan J. Pandit + 2024-08-16 + accepted - Racial Discrimination - Discrimination against individuals because of their racial background or skin color - 2024-09-30 - + 2022-08-17 + Unwanted Disclosure of Data + - - + + accepted + + + - - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Harshvardhan J. Pandit + + Concept representing Physical Assault + 2022-08-17 + Physical Assault 2024-08-16 - - Prevent Exercising of Rights - accepted - Actions or measures that prevent an individual or group from exercising their legal rights. - + - - ISO/IEC 24027:2021 + + 2024-09-30 + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + + + Transphobia + + accepted + + + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + Cognitive Bias + 2024-09-13 + ISO/IEC 24027:2021 + accepted + Bias that occurs when humans are processing and interpreting information Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - Confounding Variables Bias + + + + 2024-10-21 + Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + + + + + + + + Organisational in this context refers to an organisation which is not human but is managed by humans accepted - 2024-09-13 - + + Organisational Risk Concept + - - accepted + + + - - - 2024-09-30 - Misandry + accepted - Dislike, contempt, or prejudice against men - + 2024-10-21 + Service Not Provided + Stub + - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - + + + Georg P. Krog + + + + + + Unauthorised Re-Identification + 2022-08-19 + accepted + Concept representing Unauthorised Re-Identification + 2024-08-16 + + + + + + + - Privacy accepted - + 2024-08-16 + 2022-08-17 + Lose of Credibility + Concept representing Loss of Credibility + + Harshvardhan J. Pandit + - - Something that acts as or causes Unauthorised System Modification - - + + Concept representing Phishing Scam - + + + - Unauthorised System Modification - - - 2024-08-16 + accepted Harshvardhan J. Pandit + + Phishing Scam + 2022-08-17 - accepted - + 2024-08-16 + - + + accepted + + - + - - 2022-08-19 - Unauthorised Re-Identification + 2024-08-16 - accepted - Georg P. Krog - Something that acts as or causes Unauthorised Re-Identification + Unwanted Data Deletion + Concept representing Unwanted Data Deletion + 2022-08-17 + Harshvardhan J. Pandit - - Something that acts as or causes Misuse + + + + + - - + - 2024-06-11 - accepted - Delaram Golpayegani + Concept representing Data Breach + + - Misuse + Harshvardhan J. Pandit 2024-08-16 - + accepted + 2022-08-17 + Data Breach + + - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Threat Landscape for Ransomware Attacks 2022 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + + + + + + + ISO/IEC 24027:2021 + 2024-09-13 + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + + - - - + + Psychological Harm Harshvardhan J. Pandit - Compromise Account Credentials - - Something that acts as or causes Account Credentials to be compromised - 2024-08-16 accepted + + Concept representing Psychological Harm 2022-08-17 - - + 2024-08-16 + + - - The criteria for what is considered material damage is based in jurisdictional laws and norms - Something that acts as or causes Material Damage - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + modified + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + - - 2024-08-16 - accepted - Material Damage - Harshvardhan J. Pandit - 2022-03-30 - - - - 2022-08-17 + Concept representing Violation of Statutory Obligations Harshvardhan J. Pandit - - - + Violating Statutory Obligations + + + + + Concept representing Social Disadvantage - + + + - + 2022-08-19 accepted - Something that acts as or causes Identity Theft - Identity Theft + 2024-08-16 - + Georg P. Krog + Social Disadvantage + - - Discrimination based on a person's geographical origin or residence - + + + + + + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO 20501:2019 + Statistical Bias + 2024-09-13 + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + accepted + + + + - + + + - Geographic Discrimination - 2024-09-30 accepted + Public Services Exclusion + 2024-10-21 + Stub - + - - + + + - - - - + + Privacy accepted - + + - + Harshvardhan J. Pandit - 2024-08-16 - Copyright Violation - + + + - - Something that acts as or causes Copyright Violation accepted + + 2022-08-17 - - + System Failure + Concept representing System Failure + 2024-08-16 + Here system refers to both hardware and software systems + - - + + 2022-08-17 + + + + + - - - 2024-09-30 + Concept representing System Intrusion + 2024-08-16 + System Intrusion + + Harshvardhan J. Pandit accepted - Prejudice or discrimination against people based on their race - Racism - + - - Harshvardhan J. Pandit - 2024-08-16 + + - - 2022-08-17 - + Harshvardhan J. Pandit accepted - - Lose of Opportunity - Something that acts as or causes Loss of Opportunity + + 2024-08-16 + 2022-08-17 + + Concept representing Loss of Trust + Lose of Trust - - - - + + 2024-08-16 + 2022-08-17 + Extorsion + + + + + - Gender Discrimination - 2024-09-30 - - Discrimination based on a person's gender identity or gender expression + Harshvardhan J. Pandit accepted - + + Concept representing Extorsion + - - - + - - + - + + - accepted 2022-08-17 2024-08-16 - Something that acts as or causes Data Breach - - - + Concept representing Unauthorised System Modification + + Unauthorised System Modification - Data Breach Harshvardhan J. Pandit - + accepted + - - + - + + + accepted + Concept representing accidental misuse (of something) + Accidental Misuse + + + 2022-08-17 - accepted - - This concept was called "HarmfulSpeech" in DPV 2.0 + Rights Impact Harshvardhan J. Pandit - Something that acts as or causes Harmful Speech - 2024-08-16 - Exposure to Harmful Speech - - - - Individual Health & Safety - - - + + + + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - - - - 2024-08-16 - - - - - - - + Concept representing Impact to Rights - Something that acts as or causes Unauthorised Data Disclosure - Unauthorised Data Disclosure - Harshvardhan J. Pandit - accepted - - 2022-08-17 - + 2024-08-16 + - - + - + - - accepted - Something that acts as or causes System Failure - + This concept was called "ViolationContractualObligations" in DPV 2.0 + Violating Contractual Obligation + 2022-08-17 2024-08-16 - System Failure + Concept representing Violation of Contractual Obligations - 2022-08-17 Harshvardhan J. Pandit - Here system refers to both hardware and software systems - + + modified + + - + - + - + - In-Group Bias - ISO/IEC 24027:2021 - Bias that occurs when showing partiality to one's own group or own characteristics - 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + Malicious Activity accepted - + - - Dislike, contempt, or prejudice against women - - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + - 2024-09-30 accepted - Misogyny - + Physical Harm + - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Societal Health & Safety + + + + + + + accepted + + + + The gradual weakening or reduction of the scope and protection of rights + - + + + accepted + Rights Eroded + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + + + + + + + + + 2022-08-17 + 2024-08-16 + Harshvardhan J. Pandit accepted - Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - 2024-09-30 - Reverse Discrimination - + + Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + Human Errors + - + + - + - 2024-08-16 - Something that acts as or provides payment e.g. to access a service or purchase resources - - Payment - Georg P. Krog, Harshvardhan J. Pandit accepted - 2024-04-14 - + Concept representing failure to verify identity + 2024-10-21 + Identity Verification Failure + - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + Concept representing Security Breach + + - - + + + + - 2024-09-30 + Harshvardhan J. Pandit accepted - Transphobia + Security Breach - Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + 2022-08-17 + 2024-08-16 + - + + - + + Harshvardhan J. Pandit - - Physical Assault - - Something that acts as or causes Physical Assault + accepted + + Concept representing Unwanted Code Deletion 2022-08-17 2024-08-16 - + Unwanted Code Deletion + - - 2022-08-17 - Harshvardhan J. Pandit - - + + + accepted - This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - - Impact to Rights + + 2024-10-21 + Service Partially Provided + Stub + + + + + + + + + + + Stub + accepted + Personalisation Disabled + 2024-10-21 + + + + + + + + + + 2024-08-16 - Something that acts as or causes Impact to Rights + Identity Theft + Concept representing Identity Theft - - - + Harshvardhan J. Pandit + accepted - + 2022-08-17 + + + + + - - - - + Harshvardhan J. Pandit + accepted + 2024-08-16 + 2022-08-17 - Something that acts as or causes Security Breach - - - Security Breach - + Concept representing Account Credentials to be compromised + Compromise Account Credentials + - + + 2022-08-17 - Something that acts as or causes Violation of Ethics Code - + + + - Violating Ethics Code - - modified + Here equipment refers to physical equipment 2024-08-16 - This concept was called "ViolationEthicalCode" in DPV 2.0 + Concept representing Equipment Failure Harshvardhan J. Pandit + Equipment Failure + accepted - + - - Discrimination based on a person's age, often impacting older or younger individuals - - - - + + + + + + + Harshvardhan J. Pandit accepted - 2024-09-30 - Age Discrimination + Unauthorised Data Modification + + Concept representing Unauthorised Data Modification - + 2022-08-17 + 2024-08-16 + - - + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + - - + + - 2024-08-16 accepted - 2022-08-17 - - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment + + Harshvardhan J. Pandit - + 2022-08-17 + Concept representing Unauthorised Code Modification + 2024-08-16 + Unauthorised Code Modification + - - + - + + - accepted + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + Indirect Discrimination 2024-09-30 - Religious Discrimination - Discrimination based on a person's religious beliefs or practices + accepted - + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + + Something that acts as or provides payment e.g. to access a service or purchase resources + - + - - - + + accepted + Payment + 2024-04-14 2024-08-16 - accepted - 2022-08-17 - Harshvardhan J. Pandit - Something that acts as or causes System Malfunction - System Malfunction - Here system refers to both hardware and software systems - - + Georg P. Krog, Harshvardhan J. Pandit + - + + + + + + + + + Technical Risk Concept + Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes accepted + + Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + 2024-10-21 + + + + Concept representing a misuse (of something) + Misuse + 2024-08-16 + + + + + + 2024-06-11 + Delaram Golpayegani + accepted + + + + + - + - + + + Concept representing Confidentiality Breach + Harshvardhan J. Pandit + accepted + Confidentiality Breach + 2024-08-16 + 2022-08-17 - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + Risk Concepts - HTML serialiation - - - Guides for Data Privacy Vocabulary + - - ISO/IEC 24027:2021 - + + + + + + + + + Unauthorised Activity + Concept representing Unauthorised Activity + + accepted + + + + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + + - + ISO/IEC 24027:2021 2024-09-13 + Rule based system design also potentially introduces various forms of human cognitive bias accepted - Selection Bias Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - + + Rule-Based System Design + - - - https://w3id.org/dpv/risk# - http://www.w3.org/2004/02/skos/core - http://www.w3.org/2000/01/rdf-schema - - 2022-08-14 - - - - - - - - - RISK - Daniel Doherty - Georg P. Krog - Julian Flake - Fajar Ekaputra + + + + + + + + Harshvardhan J. Pandit - Axel Polleres - Delaram Golpayegani - Beatriz Esteves - - 2022-08-14 - Harshvardhan J. Pandit - Julian Flake - Delaram Golpayegani - Beatriz Esteves - Rob Brennan - Georg P. Krog - Paul Ryan - 2.1-dev - - - - - - - http://purl.org/ontology/bibo/status/published - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2.1-dev - - Risk Concepts - 10.5281/zenodo.12505841 - risk - 2024-08-18 - - https://w3id.org/dpv/risk - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - - + Erroneous Use + accepted + + 2022-08-17 + Concept representing erroneous use (of something) 2024-08-16 - + + + + + + + + + Discrimination based on a person's age, often impacting older or younger individuals + 2024-09-30 + accepted + + Age Discrimination + + + + Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal + + + 2024-08-16 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + 2022-03-23 + Concept representing benefits - both material and immaterial + Benefit accepted - Social Disadvantage - Georg P. Krog - 2022-08-19 - Something that acts as or causes Social Disadvantage - + - + + Concept representing Malware Attack - + Malware Attack + - + + + + - - Something that acts as or causes Violation of Contractual Obligations + accepted + 2024-08-16 + 2022-08-17 - modified - This concept was called "ViolationContractualObligations" in DPV 2.0 - Violation of Contractual Obligation Harshvardhan J. Pandit - 2024-08-16 - + - - - + + + + Stub accepted - 2024-04-14 - 2024-08-16 - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - Georg P. Krog, Harshvardhan J. Pandit - - - - - - Primer for Data Privacy Vocabulary - - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + Service Denied + 2024-10-21 + - - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Resource Use - 2024-08-16 - accepted - 2022-08-17 - Unauthorised Resource Use - - - + + Stub - + + + + 2024-10-21 + accepted - - + Personalisation Enabled + - - - + + + - + + + - 2024-08-16 - A limitation or restrictions on the scope or exercise of rights - Limitation of Rights - This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 + Lose of Negotiating Capacity + 2022-08-17 + Harshvardhan J. Pandit accepted - + Concept representing Loss of Negotiating Capacity + - - - - + + + + + + Risk Concepts - RDF/XML serialiation + + + - + + + + - 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - accepted - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - ISO/IEC 24027:2021 + 2024-09-30 + Discrimination against individuals because of their racial background or skin color + Racial Discrimination - Group Attribution Bias - - - accepted - - + + + + A consequence that is legally relevant i.e. actionable under law + + - 2024-09-30 - Sexism - Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - + accepted + Legally Relevant Consequence + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + + + + + + accepted + + Interference with or blocking of the exercise of rights + Rights Obstructed + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - accepted - - + + 2024-10-21 + Stub - + + + - Accidental Misuse - Accidental Misuse + accepted - + Inability to Establish Legal Claims + - - + + 2024-09-30 - + + - + - 2024-09-13 - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - ISO/IEC 24027:2021 - Data Aggregation Bias + Dislike, contempt, or prejudice against men + Misandry accepted - + - + ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + + Disability Discrimination + + + + + + accepted + + Discrimination against individuals based on physical or mental disabilities + 2024-09-30 + + + + + + + + accepted + Inability to Fulfill Legal Obligations + 2024-10-21 + Stub + + + + 2024-09-13 + + + + - Violating Policy + accepted + Confirmation Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Something that acts as or causes violation of policy which can be either internal or external policy - + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + ISO/IEC 24027:2021 + - + - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - + + + + + + Component Malfunction + accepted + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Concept representing Component Malfunction + + + + - + + + - Harshvardhan J. Pandit - - 2022-08-17 accepted - 2024-08-16 - Brute Force Authorisations - + + Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + Legal Risk Concept + 2024-10-21 + Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation + - + + + + + - - - - - - - - Something that acts as or causes Unauthorised Activity - + Reverse Discrimination + 2024-09-30 + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality accepted - Unauthorised Activity - + + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + + Direct Discrimination + 2024-09-30 + + - - 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - ISO/IEC 24027:2021 - - Data Bias accepted - + + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + - + + Environmental Risk - + - Lose of Credibility - Harshvardhan J. Pandit - Something that acts as or causes Loss of Credibility - 2022-08-17 - accepted - - 2024-08-16 - + + Risks and issues that have their origin in environment or can affect the environment at large + 2024-10-21 + - + 2024-08-16 - - Unauthorised Information Disclosure - + - - + - - Harshvardhan J. Pandit accepted 2022-08-17 - Something that acts as or causes Unauthorised Information Disclosure - + Concept representing Distributed Denial of Service Attack (DDoS) + + Distributed Denial of Service Attack (DDoS) + + Harshvardhan J. Pandit + - - accepted + + + + + Risk Concepts - N3 serialiation + + + + - - - - User Risks - Concepts associated with risks that arise due to User or Human use - - - - - + - - - - Harassment accepted - + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + + - + + + + + + + Guides for Data Privacy Vocabulary + + + 2024-09-13 - - + - + + - Unfulfilment of Rights - Failure to meet or complete the fulfilment of rights - - Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + ISO/IEC 24027:2021 + Data Aggregation Bias + - + + - - - - + + - 2022-08-17 - accepted - Something that acts as or causes Authorisation Failure - Harshvardhan J. Pandit - Authorisation Failure + Discrimination against individuals based on their ethnicity or cultural heritage - 2024-08-16 - - - - ENISA Threat Taxonomy 2016 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + Ethnic Discrimination + 2024-09-30 + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - Georg P. Krog, Harshvardhan J. Pandit - + accepted + - + - + - accepted - Something that acts as or provides renumeration which is in monetary or financial form - 2024-04-14 Remuneration + Georg P. Krog, Harshvardhan J. Pandit 2024-08-16 + Something that acts as or provides renumeration which is in monetary or financial form + 2024-04-14 - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - ENISA Reference Incident Classification Taxonomy 2018 - - 2024-09-30 + + + + + + + accepted + + 2024-09-30 + Excellence Discrimination + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + + + + + + + 2024-10-21 + Stub + Inability to Enter Into Contract + accepted + + + + + + + + 2024-10-21 + The occurence or potential occurence of floods + Floods accepted - Discrimination based on a person's caste, a form of social stratification found in some cultures - Caste Discrimination - + - + + + + + - - - - + Societal Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + 2024-10-21 accepted - Something that acts as or causes Denial of Service Attack (DoS) - 2024-08-16 - Harshvardhan J. Pandit - Denial of Service Attack (DoS) - 2022-08-17 - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure + - + + + Risk Concepts - JSON-LD serialiation + + - Risk Concepts - RDF/XML serialiation - - - - + + + + + + + 2024-09-30 + Homophobia + + accepted + Hostility or prejudice against individuals who are or are perceived to be homosexual + + + + + + + + + + + + accepted + + + + 2024-09-13 + ISO/IEC 24027:2021 - - + + + - - ISO 20501:2019 - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + Data Processing Bias Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - 2024-09-13 - Statistical Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias accepted + - - + + + - - + - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + 2024-10-21 + Inability to Process Payments - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Stub accepted - Simpson'S Paradox Bias - 2024-09-13 - ISO/IEC 24027:2021 - + - - + + Violating Policy + + + + + + accepted + + Concept representing violation of policy which can be either internal or external policy + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - + - - + + + - - Something that acts as or causes Loss of Customer Confidence - accepted - Lose of Customer Confidence + This concept refers to the general abstract notion of harm + 2024-08-16 + Harm + accepted + Concept representing Harm to humans + 2022-08-13 Harshvardhan J. Pandit - 2022-08-17 - - - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + - - + + + - - + 2024-08-16 - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised System Access + + Concept representing Unauthorised System Access 2022-08-17 - - accepted Unauthorised System Access + Harshvardhan J. Pandit + accepted - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + + + + + - - + - - 2022-08-17 - Lose of Reputation + Concept representing an attack on security with the aim of undermining it accepted - - 2024-08-16 - Something that acts as or causes Loss of Reputation - Harshvardhan J. Pandit - + Security Attack + - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + + + + + + + Language Discrimination + + 2024-09-30 + accepted + Discrimination based on a person's language, often linked to national origin or ethnicity + - + + + - - + - Reputational Risk - Risks and issues that affect the reputation of the organisation accepted - - - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + Something that acts as or provides compensation - which can be monetary and financial or in other forms + 2024-04-14 + Compensation + Georg P. Krog, Harshvardhan J. Pandit + 2024-08-16 + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + Service Alternative Offered + Stub + 2024-10-21 + accepted + - + + 2024-09-30 - + - Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - accepted - 2024-09-30 + Discrimination based on a person's religious beliefs or practices - Indirect Discrimination + accepted + Religious Discrimination - - - - + + ENISA Threat Landscape for Ransomware Attacks 2022 + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + + Risk Concepts - Turtle serialiation + + + + + - + + + + - 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Requirements bias also represents occasions for the human cognitive biases to manifest - accepted - Bias that occurs in or during requirements creation - ISO/IEC 24027:2021 - Requirements Bias + 2022-08-18 + A limitation or restrictions on the scope or exercise of rights - + accepted + Rights Limited + 2024-08-16 + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Georg P. Krog, Harshvardhan J. Pandit + - - - + + + - - 2024-08-16 - Harshvardhan J. Pandit + Something that involves or causes judicial costs to be paid accepted - 2022-03-30 - Non-Material Damage - Something that acts as or causes Non-Material Damage - The criteria for what is considered material damage is based in jurisdictional laws and norms - + + Judicial Costs + - - - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html + + + - + + - accepted - 2024-09-30 - Discrimination against individuals based on their ethnicity or cultural heritage - Ethnic Discrimination + 2024-10-21 + Stub - + Inability to Provide Health Care + accepted + - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - + + + + + Examples for Data Privacy Vocabulary + + - + + Caste Discrimination + Discrimination based on a person's caste, a form of social stratification found in some cultures + + + + + + + 2024-09-30 + accepted + + + + + + + + + accepted + + + + + + + + Reputational Risk accepted - Intentional Misuse - Intentional Misuse - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Methodology for Sectoral Cybersecurity Assessments + Risks and issues that affect the reputation of the organisation + - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 - - ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - ISO/IEC 24027:2021 - Bias that occurs when humans are processing and interpreting information - + + - + - - Cognitive Bias accepted - 2024-09-13 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + Concept representing delayed processing of applications + Delayed Application Processing + 2024-10-21 + - - + + Stub + + - - - + - Something that acts as or causes Unauthorised Code Modification - 2024-08-16 - 2022-08-17 - Harshvardhan J. Pandit accepted - - Unauthorised Code Modification - + Service Limited + 2024-10-21 + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + + - - - - + - 2024-08-16 - + + Terrorism Harshvardhan J. Pandit - Something that acts as or causes Confidentiality Breach - Confidentiality Breach + Concept representing Terrorism + + 2024-08-16 + accepted 2022-08-17 + + + + + + + + + accepted - - + Prejudice or discrimination against people based on their race + + 2024-09-30 + Racism + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - - - - - - Sexual Harassment - accepted - - - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - + + - + - + - - Societal Risk accepted - Risks and issues that affect or have the potential to affect society at large or specific groups in society - + Rights Unfulfilled + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + Failure to meet or complete the fulfilment of rights + - - https://www.iso.org/standard/75281.html + + ENISa Trust Services Security Incidents 2021 - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - - 2024-09-13 + - + + - - ISO/IEC 24027:2021 - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - - Data Processing Bias - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2024-08-16 + + 2022-08-17 + Harshvardhan J. Pandit accepted - + + Concept representing Injury + Injury + - - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + https://www.iso.org/standard/75281.html - - Disability Discrimination - Discrimination against individuals based on physical or mental disabilities - - - + + - 2024-09-30 + Risks and consequences regarding legal compliance and its violation accepted - + + Legal Compliance Risk + - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - + - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - + + ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + ISO/IEC 27005:2018 - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + Harshvardhan J. Pandit + + + + + + + + Sexual Violence + accepted + Concept representing Sexual Violence + + 2024-08-16 + 2022-08-17 + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + + + + Primer for Data Privacy Vocabulary + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - ISO/IEC 27005:2018 + + + + + + + + accepted + A consequence related to the provision of a service + + 2024-10-21 + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 - + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - ENISA Threat Landscape for Ransomware Attacks 2022 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 diff --git a/2.1-dev/risk/modules/risk_taxonomy-owl.ttl b/2.1-dev/risk/modules/risk_taxonomy-owl.ttl index 1dc03ef44..f561c65db 100644 --- a/2.1-dev/risk/modules/risk_taxonomy-owl.ttl +++ b/2.1-dev/risk/modules/risk_taxonomy-owl.ttl @@ -24,7 +24,7 @@ risk-owl:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:prefLabel "Accidental Misuse"@en . risk-owl:AgeDiscrimination a rdfs:Class, @@ -56,7 +56,7 @@ risk-owl:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, @@ -82,8 +82,9 @@ risk-owl:Benefit a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes benefits"@en ; - skos:prefLabel "Benefit"@en . + skos:definition "Concept representing benefits - both material and immaterial"@en ; + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk-owl:Bias a rdfs:Class, owl:Class, @@ -95,7 +96,7 @@ risk-owl:Bias a rdfs:Class, dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:prefLabel "Bias"@en . @@ -116,7 +117,7 @@ risk-owl:Blackmail a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, @@ -135,7 +136,7 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . risk-owl:CasteDiscrimination a rdfs:Class, @@ -167,7 +168,7 @@ risk-owl:Coercion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:CognitiveBias a rdfs:Class, @@ -210,7 +211,7 @@ risk-owl:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -224,7 +225,7 @@ risk-owl:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -246,7 +247,7 @@ risk-owl:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, @@ -265,7 +266,7 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, @@ -284,7 +285,7 @@ risk-owl:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . risk-owl:ConfirmationBias a rdfs:Class, @@ -329,9 +330,10 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:definition "Concept representing Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . risk-owl:CoverageBias a rdfs:Class, @@ -364,9 +366,22 @@ risk-owl:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . +risk-owl:CustomerSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:prefLabel "Customer Support Limited"@en . + risk-owl:Damage a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -377,9 +392,9 @@ risk-owl:Damage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:definition "Concept representing Damage"@en ; skos:prefLabel "Damage"@en . risk-owl:DataAggregationBias a rdfs:Class, @@ -432,7 +447,7 @@ risk-owl:DataBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, @@ -451,7 +466,7 @@ risk-owl:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -470,6 +485,19 @@ risk-owl:DataProcessingBias a rdfs:Class, skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; skos:prefLabel "Data Processing Bias"@en . +risk-owl:DelayedApplicationProcessing a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:prefLabel "Delayed Application Processing"@en . + risk-owl:DenialServiceAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -485,21 +513,22 @@ risk-owl:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:Detriment a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:definition "Concept representing Detriment"@en ; skos:prefLabel "Detriment"@en . risk-owl:DirectDiscrimination a rdfs:Class, @@ -530,23 +559,31 @@ risk-owl:DisabilityDiscrimination a rdfs:Class, risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk, risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:prefLabel "Discrimination"@en . +risk-owl:DisproportionateEnergyConsumption a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -562,18 +599,32 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk-owl:EnvironmentalRisk a rdfs:Class, +risk-owl:Earthquake a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:prefLabel "Earthquake"@en . + +risk-owl:EnvironmentalRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; + sw:term_status "accepted"@en ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:prefLabel "Environmental Risk"@en . @@ -593,7 +644,7 @@ risk-owl:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -613,11 +664,11 @@ risk-owl:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:ErroneousSystemUse a rdfs:Class, +risk-owl:ErroneousUse a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -632,8 +683,8 @@ risk-owl:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:prefLabel "Erroneous System Use"@en . + skos:definition "Concept representing erroneous use (of something)"@en ; + skos:prefLabel "Erroneous Use"@en . risk-owl:EthnicDiscrimination a rdfs:Class, owl:Class, @@ -674,9 +725,9 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:definition "Concept representing Harmful Speech"@en ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -685,7 +736,7 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, dpv-owl:RiskConcept, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:prefLabel "External Security Threat"@en . @@ -706,7 +757,7 @@ risk-owl:Extorsion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:FinancialImpact a rdfs:Class, @@ -715,8 +766,9 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:prefLabel "Financial Impact"@en . @@ -736,9 +788,22 @@ risk-owl:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . +risk-owl:Floods a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:prefLabel "Floods"@en . + risk-owl:Fraud a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -755,7 +820,7 @@ risk-owl:Fraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:prefLabel "Fraud"@en . risk-owl:GenderDiscrimination a rdfs:Class, @@ -799,6 +864,18 @@ risk-owl:GroupAttributionBias a rdfs:Class, skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; skos:prefLabel "Group Attribution Bias"@en . +risk-owl:GroupRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:prefLabel "Societal Risk"@en . + risk-owl:Harassment a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -822,7 +899,7 @@ risk-owl:Harm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -854,7 +931,7 @@ risk-owl:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:prefLabel "Human Errors"@en . risk-owl:IdentityFraud a rdfs:Class, @@ -873,7 +950,7 @@ risk-owl:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, @@ -892,9 +969,22 @@ risk-owl:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . +risk-owl:IdentityVerificationFailure a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:prefLabel "Identity Verification Failure"@en . + risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -907,9 +997,9 @@ risk-owl:IllegalDataProcessing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -943,6 +1033,84 @@ risk-owl:InGroupBias a rdfs:Class, skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; skos:prefLabel "In-Group Bias"@en . +risk-owl:InabilityToEnterIntoContract a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk-owl:InabilityToEstablishLegalClaims a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk-owl:InabilityToFulfillLegalObligations a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk-owl:InabilityToProcessPayments a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Process Payments"@en . + +risk-owl:InabilityToProtectVitalInterests a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk-owl:InabilityToProvideHealthCare a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk-owl:IndirectDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -969,10 +1137,12 @@ risk-owl:IndividualHealthSafety a rdfs:Class, risk-owl:IndividualRisk a rdfs:Class, owl:Class, + dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . @@ -1007,7 +1177,7 @@ risk-owl:Injury a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, @@ -1030,7 +1200,7 @@ risk-owl:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, @@ -1049,7 +1219,7 @@ risk-owl:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1090,16 +1260,56 @@ risk-owl:LanguageDiscrimination a rdfs:Class, skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; skos:prefLabel "Language Discrimination"@en . -risk-owl:LegalRisk a rdfs:Class, +risk-owl:LegalComplianceRisk a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk-owl:LegalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:prefLabel "Legal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk-owl:LegalSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Legal Support Limited"@en . + +risk-owl:LegallyRelevantConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:prefLabel "Legally Relevant Consequence"@en . risk-owl:LoseCredibility a rdfs:Class, owl:Class, @@ -1116,7 +1326,7 @@ risk-owl:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:prefLabel "Lose of Credibility"@en . risk-owl:LoseCustomerConfidence a rdfs:Class, @@ -1134,7 +1344,7 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:prefLabel "Lose of Customer Confidence"@en . risk-owl:LoseGoodwill a rdfs:Class, @@ -1152,7 +1362,7 @@ risk-owl:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:prefLabel "Lose of Goodwill"@en . risk-owl:LoseNegotiatingCapacity a rdfs:Class, @@ -1170,7 +1380,7 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk-owl:LoseOpportunity a rdfs:Class, @@ -1188,7 +1398,7 @@ risk-owl:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:prefLabel "Lose of Opportunity"@en . risk-owl:LoseReputation a rdfs:Class, @@ -1206,7 +1416,7 @@ risk-owl:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:prefLabel "Lose of Reputation"@en . risk-owl:LoseTrust a rdfs:Class, @@ -1224,9 +1434,22 @@ risk-owl:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:prefLabel "Lose of Trust"@en . +risk-owl:LoyaltyProgramExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk-owl:MaliciousActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1256,7 +1479,7 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, @@ -1276,7 +1499,7 @@ risk-owl:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, @@ -1289,9 +1512,9 @@ risk-owl:MaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:definition "Concept representing Material Damage"@en ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1333,7 +1556,7 @@ risk-owl:Misuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:prefLabel "Misuse"@en . risk-owl:NationalityDiscrimination a rdfs:Class, @@ -1359,9 +1582,9 @@ risk-owl:NonMaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1401,11 +1624,26 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OrganisationalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk-owl:OutGroupHomogeneityBias a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -1449,11 +1687,37 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . +risk-owl:PersonalisationDisabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Disabled"@en . + +risk-owl:PersonalisationEnabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Enabled"@en . + risk-owl:PhishingScam a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1470,7 +1734,7 @@ risk-owl:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, @@ -1488,7 +1752,7 @@ risk-owl:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, @@ -1502,6 +1766,17 @@ risk-owl:PhysicalHarm a rdfs:Class, sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . +risk-owl:PolicyRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:prefLabel "Policy Risk"@en . + risk-owl:Privacy a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1528,7 +1803,7 @@ risk-owl:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, @@ -1543,11 +1818,24 @@ risk-owl:PublicOrderBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:definition "Concept representing Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . +risk-owl:PublicServicesExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Public Services Exclusion"@en . + risk-owl:RacialDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -1587,7 +1875,7 @@ risk-owl:Reidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -1626,7 +1914,7 @@ risk-owl:ReputationalRisk a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . @@ -1675,20 +1963,7 @@ risk-owl:Reward a rdfs:Class, skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . -risk-owl:RightEroded a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept, - risk-owl:PotentialConsequence, - risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RightsImpact ; - sw:term_status "accepted"@en ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk-owl:RightObstructed a rdfs:Class, +risk-owl:RightsDenied a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1697,11 +1972,11 @@ risk-owl:RightObstructed a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsDenial a rdfs:Class, +risk-owl:RightsEroded a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1710,11 +1985,11 @@ risk-owl:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsExercisePrevention a rdfs:Class, +risk-owl:RightsExercisePrevented a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1727,7 +2002,7 @@ risk-owl:RightsExercisePrevention a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, @@ -1743,13 +2018,13 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en ; + skos:definition "Concept representing Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsLimitation a rdfs:Class, +risk-owl:RightsLimited a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1762,9 +2037,22 @@ risk-owl:RightsLimitation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk-owl:RightsObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsUnfulfilled a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1775,10 +2063,10 @@ risk-owl:RightsUnfulfilled a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsViolation a rdfs:Class, +risk-owl:RightsViolated a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -1791,7 +2079,7 @@ risk-owl:RightsViolation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RuleBasedSystemDesign a rdfs:Class, @@ -1827,7 +2115,7 @@ risk-owl:Sabotage a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:SamplingBias a rdfs:Class, @@ -1861,7 +2149,7 @@ risk-owl:Scam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, @@ -1875,7 +2163,7 @@ risk-owl:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, @@ -1896,7 +2184,7 @@ risk-owl:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:prefLabel "Security Breach"@en . risk-owl:SelectionBias a rdfs:Class, @@ -1914,6 +2202,161 @@ risk-owl:SelectionBias a rdfs:Class, skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; skos:prefLabel "Selection Bias"@en . +risk-owl:ServiceAlternativeOffered a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Alternative Offered"@en . + +risk-owl:ServiceCostIncreased a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Cost Increased"@en . + +risk-owl:ServiceDenied a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Denied"@en . + +risk-owl:ServiceLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Limited"@en . + +risk-owl:ServiceNotProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Not Provided"@en . + +risk-owl:ServicePartiallyProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Partially Provided"@en . + +risk-owl:ServiceProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provided"@en . + +risk-owl:ServiceProvisionDelayed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provision Delayed"@en . + +risk-owl:ServiceQualityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Quality Reduced"@en . + +risk-owl:ServiceRelatedConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence related to the provision of a service"@en . + +risk-owl:ServiceSecurityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Security Reduced"@en . + +risk-owl:ServiceTermination a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Termination"@en . + risk-owl:SexDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -1979,7 +2422,7 @@ risk-owl:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:SimpsonsParadoxBias a rdfs:Class, @@ -2007,9 +2450,9 @@ risk-owl:SocialDisadvantage a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . risk-owl:SocietalBias a rdfs:Class, @@ -2034,21 +2477,24 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Societal Health & Safety"@en . -risk-owl:SocietalRisk a rdfs:Class, +risk-owl:SocietalRiskConcept a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:prefLabel "Societal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk-owl:Spoofing a rdfs:Class, owl:Class, @@ -2067,7 +2513,7 @@ risk-owl:Spoofing a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:prefLabel "Spoofing"@en . risk-owl:StatisticalBias a rdfs:Class, @@ -2101,7 +2547,7 @@ risk-owl:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -2122,7 +2568,7 @@ risk-owl:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, @@ -2141,10 +2587,25 @@ risk-owl:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk-owl:TechnicalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk-owl:Terrorism a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -2158,9 +2619,9 @@ risk-owl:Terrorism a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:definition "Concept representing Terrorism"@en ; skos:prefLabel "Terrorism"@en . risk-owl:Transphobia a rdfs:Class, @@ -2194,7 +2655,7 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, @@ -2209,7 +2670,7 @@ risk-owl:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, @@ -2229,7 +2690,7 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, @@ -2248,7 +2709,7 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, @@ -2267,7 +2728,7 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, @@ -2286,7 +2747,7 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, @@ -2305,7 +2766,7 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, @@ -2324,7 +2785,7 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, @@ -2343,7 +2804,7 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, @@ -2359,7 +2820,7 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, @@ -2378,7 +2839,7 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, @@ -2398,7 +2859,7 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, @@ -2417,7 +2878,7 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, @@ -2437,7 +2898,7 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, @@ -2457,7 +2918,7 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, @@ -2476,7 +2937,7 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, @@ -2485,7 +2946,7 @@ risk-owl:UserRisks a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:prefLabel "User Risks"@en . @@ -2502,9 +2963,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -2520,10 +2981,11 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk-owl:ViolatingEthicsCode a rdfs:Class, @@ -2538,9 +3000,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -2556,23 +3018,48 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk-owl:ViolatingObligation a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Obligation"@en . + risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . +risk-owl:ViolatingProhibition a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Prohibition"@en . + risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -2585,10 +3072,11 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk-owl:ViolenceAgainstChildren a rdfs:Class, @@ -2606,7 +3094,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/modules/risk_taxonomy.csv b/2.1-dev/risk/modules/risk_taxonomy.csv index d286337ea..04ab9363f 100644 --- a/2.1-dev/risk/modules/risk_taxonomy.csv +++ b/2.1-dev/risk/modules/risk_taxonomy.csv @@ -1,162 +1,198 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk -AgeDiscrimination,class,https://w3id.org/dpv/risk#AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Compensation,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CasteDiscrimination,class,https://w3id.org/dpv/risk#CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -DirectDiscrimination,class,https://w3id.org/dpv/risk#DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -DisabilityDiscrimination,class,https://w3id.org/dpv/risk#DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DenialServiceAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EthnicDiscrimination,class,https://w3id.org/dpv/risk#EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk -ExcellenceDiscrimination,class,https://w3id.org/dpv/risk#ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -GenderDiscrimination,class,https://w3id.org/dpv/risk#GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -GeographicDiscrimination,class,https://w3id.org/dpv/risk#GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Harassment,class,https://w3id.org/dpv/risk#Harassment,Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk -Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk -Homophobia,class,https://w3id.org/dpv/risk#Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -IndirectDiscrimination,class,https://w3id.org/dpv/risk#IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,,,,,risk,https://w3id.org/dpv/risk -InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk -JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk -LanguageDiscrimination,class,https://w3id.org/dpv/risk#LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaliciousActivity,class,https://w3id.org/dpv/risk#MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -Misandry,class,https://w3id.org/dpv/risk#Misandry,Misandry,"Dislike, contempt, or prejudice against men",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Misogyny,class,https://w3id.org/dpv/risk#Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk -NationalityDiscrimination,class,https://w3id.org/dpv/risk#NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk -Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -RacialDiscrimination,class,https://w3id.org/dpv/risk#RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Racism,class,https://w3id.org/dpv/risk#Racism,Racism,Prejudice or discrimination against people based on their race,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -ReligiousDiscrimination,class,https://w3id.org/dpv/risk#ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk -ReverseDiscrimination,class,https://w3id.org/dpv/risk#ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -RightEroded,class,https://w3id.org/dpv/risk#RightEroded,Erosion of Rights,The gradual weakening or reduction of the scope and protection of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightObstructed,class,https://w3id.org/dpv/risk#RightObstructed,Obstruction of Rights,Interference with or blocking of the exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightsDenial,class,https://w3id.org/dpv/risk#RightsDenial,Denial of Rights,The refusal or withholding or denial of the existence or applicability of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Actions or measures that prevent an individual or group from exercising their legal rights.,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,A limitation or restrictions on the scope or exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsUnfulfilled,class,https://w3id.org/dpv/risk#RightsUnfulfilled,Unfulfilment of Rights,Failure to meet or complete the fulfilment of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SexDiscrimination,class,https://w3id.org/dpv/risk#SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Sexism,class,https://w3id.org/dpv/risk#Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -SexualHarassment,class,https://w3id.org/dpv/risk#SexualHarassment,Sexual Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk -SexualOrientationDiscrimination,class,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk -SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Transphobia,class,https://w3id.org/dpv/risk#Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,,,risk,https://w3id.org/dpv/risk -ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Concept representing accidental misuse (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +AgeDiscrimination,class,https://w3id.org/dpv/risk#AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Concept representing Authorisation Failure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Concept representing benefits - both material and immaterial,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Compensation,"Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal",2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#TechnicalRiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Concept representing Blackmail,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CasteDiscrimination,class,https://w3id.org/dpv/risk#CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Concept representing Coercion,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Concept representing Component Failure,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Concept representing Component Malfunction,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Concept representing a compromised account that is then used by the compromiser,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Concept representing Account Credentials to be compromised,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Concept representing Confidentiality Breach,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Concept representing Copyright Violation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Concept representing Cryptojacking,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CustomerSupportLimited,class,https://w3id.org/dpv/risk#CustomerSupportLimited,Customer Support Limited,Concept representing customer support to be limited,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Concept representing Damage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Concept representing Data Breach,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Concept representing Corruption of Data,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DelayedApplicationProcessing,class,https://w3id.org/dpv/risk#DelayedApplicationProcessing,Delayed Application Processing,Concept representing delayed processing of applications,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Concept representing Denial of Service Attack (DoS),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Concept representing Detriment,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +DirectDiscrimination,class,https://w3id.org/dpv/risk#DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +DisabilityDiscrimination,class,https://w3id.org/dpv/risk#DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,"Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,2024-09-30,,risk,https://w3id.org/dpv/risk +DisproportionateEnergyConsumption,class,https://w3id.org/dpv/risk#DisproportionateEnergyConsumption,Disproportionate Energy Consumption,The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv#RiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Concept representing Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#DenialServiceAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Earthquake,class,https://w3id.org/dpv/risk#Earthquake,Earthquake,The occurence or potential occurence of earthquakes,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv#RiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Concept representing Equipment Failure,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Concept representing Equipment Malfunction,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ErroneousUse,class,https://w3id.org/dpv/risk#ErroneousUse,Erroneous Use,Concept representing erroneous use (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EthnicDiscrimination,class,https://w3id.org/dpv/risk#EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExcellenceDiscrimination,class,https://w3id.org/dpv/risk#ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Concept representing Harmful Speech,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#TechnicalRiskConcept,,,,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Concept representing Extorsion,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#OrganisationalRiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Floods,class,https://w3id.org/dpv/risk#Floods,Floods,The occurence or potential occurence of floods,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv#RiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Concept representing Fraud,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +GenderDiscrimination,class,https://w3id.org/dpv/risk#GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +GeographicDiscrimination,class,https://w3id.org/dpv/risk#GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +GroupRisk,class,https://w3id.org/dpv/risk#GroupRisk,Societal Risk,Risks and issues that affect or have the potential to affect groups in society,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,,,risk,https://w3id.org/dpv/risk +Harassment,class,https://w3id.org/dpv/risk#Harassment,Harassment,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Concept representing Harm to humans,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk +Homophobia,class,https://w3id.org/dpv/risk#Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Concept representing Identity Fraud,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Concept representing Identity Theft,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityVerificationFailure,class,https://w3id.org/dpv/risk#IdentityVerificationFailure,Identity Verification Failure,Concept representing failure to verify identity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Concept representing Illegal Processing of Data,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InabilityToEnterIntoContract,class,https://w3id.org/dpv/risk#InabilityToEnterIntoContract,Inability to Enter Into Contract,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToEstablishLegalClaims,class,https://w3id.org/dpv/risk#InabilityToEstablishLegalClaims,Inability to Establish Legal Claims,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToFulfillLegalObligations,class,https://w3id.org/dpv/risk#InabilityToFulfillLegalObligations,Inability to Fulfill Legal Obligations,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToProcessPayments,class,https://w3id.org/dpv/risk#InabilityToProcessPayments,Inability to Process Payments,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToProtectVitalInterests,class,https://w3id.org/dpv/risk#InabilityToProtectVitalInterests,Inability to Protect Vital Interests,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToProvideHealthCare,class,https://w3id.org/dpv/risk#InabilityToProvideHealthCare,Inability to Provide Health Care,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +IndirectDiscrimination,class,https://w3id.org/dpv/risk#IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,,,risk,https://w3id.org/dpv/risk +InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Concept representing Injury,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Concept represent an intentional misuse (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Concept representing Interception of Communications,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +LanguageDiscrimination,class,https://w3id.org/dpv/risk#LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +LegalComplianceRisk,class,https://w3id.org/dpv/risk#LegalComplianceRisk,Legal Compliance Risk,Risks and consequences regarding legal compliance and its violation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalRiskConcept,,,,risk,https://w3id.org/dpv/risk +LegalRiskConcept,class,https://w3id.org/dpv/risk#LegalRiskConcept,Legal Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation,2024-10-21,,risk,https://w3id.org/dpv/risk +LegalSupportLimited,class,https://w3id.org/dpv/risk#LegalSupportLimited,Legal Support Limited,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +LegallyRelevantConsequence,class,https://w3id.org/dpv/risk#LegallyRelevantConsequence,Legally Relevant Consequence,A consequence that is legally relevant i.e. actionable under law,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalRiskConcept,,,,risk,https://w3id.org/dpv/risk +LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Concept representing Loss of Credibility,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Concept representing Loss of Customer Confidence,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Concept representing Loss of Goodwill,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Concept representing Loss of Negotiating Capacity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Concept representing Loss of Opportunity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Concept representing Loss of Reputation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Concept representing Loss of Trust,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoyaltyProgramExclusion,class,https://w3id.org/dpv/risk#LoyaltyProgramExclusion,Loyalty Program Exclusion,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +MaliciousActivity,class,https://w3id.org/dpv/risk#MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Concept representing Malicious Code Attack,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Concept representing Malware Attack,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Concept representing Material Damage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +Misandry,class,https://w3id.org/dpv/risk#Misandry,Misandry,"Dislike, contempt, or prejudice against men",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misogyny,class,https://w3id.org/dpv/risk#Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Concept representing a misuse (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk +NationalityDiscrimination,class,https://w3id.org/dpv/risk#NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Concept representing Non-Material Damage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#TechnicalRiskConcept,,,,risk,https://w3id.org/dpv/risk +OrganisationalRiskConcept,class,https://w3id.org/dpv/risk#OrganisationalRiskConcept,Organisational Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,Organisational in this context refers to an organisation which is not human but is managed by humans,2024-10-21,,risk,https://w3id.org/dpv/risk +OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Concept representing Personal Safety Endangerment,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalisationDisabled,class,https://w3id.org/dpv/risk#PersonalisationDisabled,Personalisation Disabled,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +PersonalisationEnabled,class,https://w3id.org/dpv/risk#PersonalisationEnabled,Personalisation Enabled,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Concept representing Phishing Scam,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Concept representing Physical Assault,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +PolicyRisk,class,https://w3id.org/dpv/risk#PolicyRisk,Policy Risk,Risks and consequences regarding policy and its associated processes,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalRiskConcept,,,,risk,https://w3id.org/dpv/risk +Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Concept representing Psychological Harm,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Concept representing Public Order Breach,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalComplianceRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicServicesExclusion,class,https://w3id.org/dpv/risk#PublicServicesExclusion,Public Services Exclusion,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +RacialDiscrimination,class,https://w3id.org/dpv/risk#RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Racism,class,https://w3id.org/dpv/risk#Racism,Racism,Prejudice or discrimination against people based on their race,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Concept representing Re-identification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +ReligiousDiscrimination,class,https://w3id.org/dpv/risk#ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#OrganisationalRiskConcept,,,,risk,https://w3id.org/dpv/risk +RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk +ReverseDiscrimination,class,https://w3id.org/dpv/risk#ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +RightsDenied,class,https://w3id.org/dpv/risk#RightsDenied,Rights Denied,The refusal or withholding or denial of the existence or applicability of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsEroded,class,https://w3id.org/dpv/risk#RightsEroded,Rights Eroded,The gradual weakening or reduction of the scope and protection of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsExercisePrevented,class,https://w3id.org/dpv/risk#RightsExercisePrevented,Rights Exercise Prevented,Actions or measures that prevent an individual or group from exercising their legal rights.,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Rights Impact,Concept representing Impact to Rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsLimited,class,https://w3id.org/dpv/risk#RightsLimited,Rights Limited,A limitation or restrictions on the scope or exercise of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsObstructed,class,https://w3id.org/dpv/risk#RightsObstructed,Rights Obstructed,Interference with or blocking of the exercise of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsUnfulfilled,class,https://w3id.org/dpv/risk#RightsUnfulfilled,Rights Unfulfilled,Failure to meet or complete the fulfilment of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsViolated,class,https://w3id.org/dpv/risk#RightsViolated,Rights Violated,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Concept representing Sabotage,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Concept representing Scam,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Concept representing an attack on security with the aim of undermining it,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Concept representing Security Breach,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ServiceAlternativeOffered,class,https://w3id.org/dpv/risk#ServiceAlternativeOffered,Service Alternative Offered,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceCostIncreased,class,https://w3id.org/dpv/risk#ServiceCostIncreased,Service Cost Increased,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceDenied,class,https://w3id.org/dpv/risk#ServiceDenied,Service Denied,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceLimited,class,https://w3id.org/dpv/risk#ServiceLimited,Service Limited,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceNotProvided,class,https://w3id.org/dpv/risk#ServiceNotProvided,Service Not Provided,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServicePartiallyProvided,class,https://w3id.org/dpv/risk#ServicePartiallyProvided,Service Partially Provided,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceProvided,class,https://w3id.org/dpv/risk#ServiceProvided,Service Provided,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceProvisionDelayed,class,https://w3id.org/dpv/risk#ServiceProvisionDelayed,Service Provision Delayed,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceQualityReduced,class,https://w3id.org/dpv/risk#ServiceQualityReduced,Service Quality Reduced,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceSecurityReduced,class,https://w3id.org/dpv/risk#ServiceSecurityReduced,Service Security Reduced,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceTermination,class,https://w3id.org/dpv/risk#ServiceTermination,Service Termination,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +SexDiscrimination,class,https://w3id.org/dpv/risk#SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Sexism,class,https://w3id.org/dpv/risk#Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualHarassment,class,https://w3id.org/dpv/risk#SexualHarassment,Sexual Harassment,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +SexualOrientationDiscrimination,class,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Concept representing Sexual Violence,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Concept representing Social Disadvantage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#GroupRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#GroupRisk,,,,risk,https://w3id.org/dpv/risk +SocietalRiskConcept,class,https://w3id.org/dpv/risk#SocietalRiskConcept,Societal Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,"Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure",2024-10-21,,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Concept representing Spoofing,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Concept representing System Failure,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Concept representing System Intrusion,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Concept representing System Malfunction,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +TechnicalRiskConcept,class,https://w3id.org/dpv/risk#TechnicalRiskConcept,Technical Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes,2024-10-21,,risk,https://w3id.org/dpv/risk +Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Concept representing Terrorism,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#GroupRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Transphobia,class,https://w3id.org/dpv/risk#Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Concept representing Unauthorised Access to Premises,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Concept representing Unauthorised Activity,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Concept representing Unauthorised Code Access,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Concept representing Unauthorised Code Disclosure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Concept representing Unauthorised Code Modification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Concept representing Unauthorised Data Access,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Concept representing Unauthorised Data Disclosure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Concept representing Unauthorised Data Modification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Concept representing Unauthorised Information Disclosure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Concept representing Unauthorised Re-Identification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Concept representing Unauthorised Resource Use,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Concept representing Unauthorised System Access,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Concept representing Unauthorised System Modification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Concept representing Unwanted Code Deletion,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Concept representing Unwanted Data Deletion,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Concept representing Unwanted Disclosure of Data,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#OrganisationalRiskConcept,,,,risk,https://w3id.org/dpv/risk +ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Concept representing Violation of Code of Conduct,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violating Contractual Obligation,Concept representing Violation of Contractual Obligations,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Concept representing Violation of Ethics Code,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violating Legal Obligation,Concept representing Violation of Legal Obligations,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingObligation,class,https://w3id.org/dpv/risk#ViolatingObligation,Violating Obligation,"Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,,2024-10-21,,risk,https://w3id.org/dpv/risk +ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Concept representing violation of policy which can be either internal or external policy,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,,,,risk,https://w3id.org/dpv/risk +ViolatingProhibition,class,https://w3id.org/dpv/risk#ViolatingProhibition,Violating Prohibition,"Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,,2024-10-21,,risk,https://w3id.org/dpv/risk +ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violating Statutory Obligations,Concept representing Violation of Statutory Obligations,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Concept representing Child Violence,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/risk_taxonomy.jsonld b/2.1-dev/risk/modules/risk_taxonomy.jsonld index 2540f8edd..8bc4ffb1e 100644 --- a/2.1-dev/risk/modules/risk_taxonomy.jsonld +++ b/2.1-dev/risk/modules/risk_taxonomy.jsonld @@ -1,18 +1,35 @@ [ { - "@id": "https://w3id.org/dpv/risk#Transphobia", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -28,13 +45,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" + "@value": "Concept representing Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -45,18 +62,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Transphobia" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISa Trust Services Security Incidents 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -77,7 +111,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66" + "@id": "_:N0673a500160d458fb2189ffe9f6498fa" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -88,18 +122,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Concept representing Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -110,46 +144,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Psychological Harm" } ] }, { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66", + "@id": "_:N0673a500160d458fb2189ffe9f6498fa", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Racism", + "@id": "https://w3id.org/dpv/risk#DataBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -165,13 +204,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#Bias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Prejudice or discrimination against people based on their race" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -182,19 +221,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Racism" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk#IndividualRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -209,13 +248,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Misuse" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -226,12 +265,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -240,28 +279,6 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -275,13 +292,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "A consequence that is legally relevant i.e. actionable under law" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -292,57 +309,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Legally Relevant Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#ReligiousDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -358,13 +342,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Discrimination based on a person's religious beliefs or practices" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -375,28 +359,50 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Religious Discrimination" } ] }, { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk#RightsUnfulfilled", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -418,7 +424,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#RightsImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Failure to meet or complete the fulfilment of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -429,22 +441,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "Rights Unfulfilled" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk#Racism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -459,13 +480,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Prejudice or discrimination against people based on their race" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -476,12 +497,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Racism" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -489,7 +510,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -510,7 +531,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -526,13 +547,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Concept representing Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -543,57 +564,41 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -609,13 +614,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -626,102 +631,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Technical Risk Concept" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataAggregationBias", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#DataBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Data Aggregation Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#CoverageBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N7acfc235cc254becbaba265d4ea9494e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -737,13 +686,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + "@value": "Concept representing Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -754,127 +703,67 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coverage Bias" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@id": "_:N7acfc235cc254becbaba265d4ea9494e", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "ENISA Threat Landscape 2021" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Security Attack" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonNormalityBias", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Non-Normality Bias" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -895,7 +784,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N809a964650274e1ca9c544fb513732ef" + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -911,13 +800,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Concept representing Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -928,51 +817,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N809a964650274e1ca9c544fb513732ef", + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonResponseBias", + "@id": "https://w3id.org/dpv/risk#InabilityToEstablishLegalClaims", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -988,13 +872,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1005,19 +889,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Response Bias" + "@value": "Inability to Establish Legal Claims" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -1038,7 +921,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndd18bed776ec45498b139828923f57f1" + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1049,18 +932,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Concept representing Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1071,12 +954,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:Ndd18bed776ec45498b139828923f57f1", + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628", "@type": [ "https://schema.org/WebPage" ], @@ -1092,64 +981,89 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - HTML serialiation" + "@value": "Risk Concepts - N3 serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.html" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and consequences regarding legal compliance and its violation" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Compliance Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1163,13 +1077,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Concept representing accidental misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1180,18 +1094,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1219,7 +1127,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1235,13 +1143,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Concept representing Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1252,51 +1160,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#InGroupBias", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevented", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1312,13 +1220,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1329,12 +1237,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "In-Group Bias" + "@value": "Rights Exercise Prevented" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sexism", + "@id": "https://w3id.org/dpv/risk#Transphobia", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1362,13 +1276,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1379,16 +1293,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexism" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk#CasteDiscrimination", + "@id": "https://w3id.org/dpv/risk#DelayedApplicationProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" @@ -1396,7 +1310,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1412,13 +1326,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + "@value": "Concept representing delayed processing of applications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1429,50 +1343,68 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Caste Discrimination" + "@value": "Delayed Application Processing" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#CustomerSupportLimited", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - N3 serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Concept representing customer support to be limited" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Customer Support Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -1493,7 +1425,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" + "@id": "_:N889cd521927340be8913f31c0baa2b9b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1509,13 +1441,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Concept representing Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1526,28 +1461,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Copyright Violation" } ] }, { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", + "@id": "_:N889cd521927340be8913f31c0baa2b9b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsDenial", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1556,61 +1491,27 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RightsImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "The refusal or withholding or denial of the existence or applicability of rights" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Denial of Rights" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1625,13 +1526,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Misuse" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Concept representing Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1642,12 +1543,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1658,13 +1575,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1673,6 +1590,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nae5245156caa4c27aeb793246d56954e" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1686,13 +1608,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Renumeration" + "@id": "https://w3id.org/dpv/risk#GroupRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Concept representing Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1703,18 +1625,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfirmationBias", + "@id": "_:Nae5245156caa4c27aeb793246d56954e", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ @@ -1753,7 +1691,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1764,12 +1702,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confirmation Bias" + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1780,13 +1724,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1795,6 +1739,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1808,13 +1757,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." + "@value": "Concept representing Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1825,97 +1774,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsUnfulfilled", + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RightsImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Failure to meet or complete the fulfilment of rights" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Unfulfilment of Rights" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#CasteDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1931,13 +1823,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1948,28 +1840,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Caste Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "https://w3id.org/dpv/risk#ServiceTermination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1978,21 +1854,10 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2008,13 +1873,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Renumeration" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2025,18 +1890,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Service Termination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2057,7 +1924,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2068,18 +1935,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Concept representing Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2090,34 +1957,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Identity Theft" } ] }, { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2125,9 +1986,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2148,7 +2007,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N01f7495831e241abad48b454e2462d19" + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2164,13 +2023,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Concept representing Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2181,87 +2040,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N01f7495831e241abad48b454e2462d19", + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#SocietalBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2277,13 +2100,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2294,55 +2117,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Societal Bias" } ] }, { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", + "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8626c0b412094a41834e4fa199b449f9" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2358,13 +2161,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2375,63 +2178,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N8626c0b412094a41834e4fa199b449f9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#GeographicDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2447,13 +2211,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Discrimination based on a person's geographical origin or residence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2464,40 +2228,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" - } - ] - }, - { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2513,13 +2272,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#Compensation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + "@value": "Concept representing benefits - both material and immaterial" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2530,20 +2289,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "SexualOrientation Discrimination" + "@value": "Benefit" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -2564,7 +2328,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" + "@id": "_:N597e8421bc334907aef6fa116a95a520" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2580,13 +2344,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Concept representing Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2597,61 +2361,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", + "@id": "_:N597e8421bc334907aef6fa116a95a520", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#ServiceAlternativeOffered", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2662,18 +2405,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2684,34 +2427,62 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Service Alternative Offered" } ] }, { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", + "@id": "https://w3id.org/dpv/risk#InabilityToEnterIntoContract", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Enter Into Contract" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk#ServicePartiallyProvided", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2720,6 +2491,12 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -2733,13 +2510,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2750,19 +2527,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Service Partially Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -2783,7 +2559,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" + "@id": "_:Na801ef084cf6488facf5802801e4ce8b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2799,13 +2575,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Concept representing Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2816,12 +2592,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", + "@id": "_:Na801ef084cf6488facf5802801e4ce8b", "@type": [ "https://schema.org/WebPage" ], @@ -2837,12 +2619,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#ServiceProvided", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource" + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2857,13 +2647,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2874,40 +2664,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Service Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#RequirementsBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2923,13 +2708,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2940,58 +2725,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" - } - ] - }, - { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Requirements Bias" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" - } + "https://w3id.org/dpv/risk#PotentialRiskSource" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3006,13 +2756,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3023,101 +2773,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RightsImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Violation of Rights" + "@value": "2024-09-13" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UserRisks", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3132,13 +2817,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3149,21 +2834,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -3184,7 +2867,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3200,13 +2883,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Concept representing Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3217,36 +2900,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk#Harassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3261,47 +2943,30 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Harassment" + } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N70af67194f054cbcbe4d1d616683423b" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3316,13 +2981,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#FinancialLoss" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3333,32 +2998,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N70af67194f054cbcbe4d1d616683423b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#Homophobia", + "@id": "https://w3id.org/dpv/risk#ServiceQualityReduced", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" @@ -3366,7 +3015,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3382,13 +3031,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3399,12 +3048,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Homophobia" + "@value": "Service Quality Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#RightsEroded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3426,13 +3075,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialLoss" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3443,27 +3092,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Rights Eroded" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#GenderDiscrimination", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -3476,13 +3124,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's gender identity or gender expression" + "@value": "Concept representing violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3493,41 +3141,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Gender Discrimination" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#InformativenessBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nadd5922c22574bd38879939155a85ae3" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3543,13 +3185,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3560,83 +3202,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Informativeness Bias" } ] }, { - "@id": "_:Nadd5922c22574bd38879939155a85ae3", + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Operational Security Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ExcellenceDiscrimination", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3652,13 +3257,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" + "@value": "Concept representing Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3669,18 +3274,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Excellence Discrimination" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3701,7 +3324,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3712,18 +3335,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Concept representing Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3734,32 +3357,39 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#DisabilityDiscrimination", + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" @@ -3767,7 +3397,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3783,13 +3413,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on physical or mental disabilities" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3800,42 +3430,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Disability Discrimination" + "@value": "Legal Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3851,13 +3469,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3868,35 +3486,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3906,7 +3509,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -3915,11 +3518,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3933,13 +3531,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Concept representing Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3950,28 +3548,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" - } - ] - }, - { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Re-identification" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#ServiceNotProvided", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3980,21 +3568,10 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4010,13 +3587,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4027,41 +3604,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Service Not Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#AgeDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4077,13 +3637,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4094,36 +3654,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Age Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#ErroneousUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -4144,7 +3687,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N45e627abb33f484ea319253eb043bcd9" + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4160,13 +3703,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Concept representing erroneous use (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4177,35 +3720,58 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Erroneous Use" } ] }, { - "@id": "_:N45e627abb33f484ea319253eb043bcd9", + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4215,18 +3781,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Concept representing Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4237,20 +3803,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -4271,7 +3857,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4287,13 +3873,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Concept representing Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4304,18 +3893,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "Violating Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98", "@type": [ "https://schema.org/WebPage" ], @@ -4331,7 +3920,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#NationalityDiscrimination", + "@id": "https://w3id.org/dpv/risk#DisabilityDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4365,7 +3954,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's nationality or citizenship" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4376,36 +3965,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Nationality Discrimination" + "@value": "Disability Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", + "@id": "https://w3id.org/dpv/risk#RightsDenied", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4420,13 +3992,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + "@value": "The refusal or withholding or denial of the existence or applicability of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4437,29 +4009,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Out-Group Homogeneity Bias" + "@value": "Rights Denied" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -4468,6 +4046,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4481,13 +4064,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Concept representing Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4498,16 +4081,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexDiscrimination", + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DisproportionateEnergyConsumption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" @@ -4515,7 +4114,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4531,13 +4130,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's biological sex" + "@value": "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4548,62 +4147,71 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sex Discrimination" + "@value": "Disproportionate Energy Consumption" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Societal Health & Safety" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misandry", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4619,13 +4227,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against men" + "@value": "Concept representing Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4636,24 +4244,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misandry" + "@value": "Lose of Credibility" } ] }, { - "@id": "https://w3id.org/dpv/risk#GeographicDiscrimination", + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4669,13 +4304,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's geographical origin or residence" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4686,19 +4321,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Geographic Discrimination" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4719,7 +4355,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4735,13 +4371,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Concept representing Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4752,35 +4388,37 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Blackmail" } ] }, { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4801,7 +4439,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" + "@id": "_:Ndfdabe58832a445293583eabfe4518fb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4817,13 +4455,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Concept representing Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4834,35 +4472,59 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", + "@id": "_:Ndfdabe58832a445293583eabfe4518fb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightObstructed", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4877,13 +4539,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interference with or blocking of the exercise of rights" + "@value": "Concept representing Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4894,41 +4556,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Obstruction of Rights" + "@value": "Unwanted Data Deletion" } + ] + }, + { + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImplicitBias", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N0bcefedd768f46769c68ec31fad757da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4944,13 +4622,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + "@value": "Concept representing Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4961,51 +4639,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Implicit Bias" + "@value": "Coercion" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "_:N0bcefedd768f46769c68ec31fad757da", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5020,13 +4682,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5037,40 +4699,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5080,18 +4721,12 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5102,34 +4737,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualHarassment", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5151,7 +4764,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#GroupRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5162,12 +4775,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Harassment" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#Bias", + "@id": "https://w3id.org/dpv/risk#DataAggregationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5206,13 +4819,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskConcept" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5223,20 +4836,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Bias" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -5257,7 +4868,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae" + "@id": "_:N415855303c6a4ae18e62e54d5a894a07" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5268,18 +4879,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Concept representing Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5290,101 +4904,65 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Violating Contractual Obligation" } - ] + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + } + ] }, { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae", + "@id": "_:N415855303c6a4ae18e62e54d5a894a07", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightEroded", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RightsImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The gradual weakening or reduction of the scope and protection of rights" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Erosion of Rights" - } + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RequirementsBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N76a6ce1a060d4760be82a172d993465b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5400,13 +4978,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs in or during requirements creation" + "@value": "Concept representing a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5417,25 +4995,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Requirements Bias" + "@value": "Compromise Account" } + ] + }, + { + "@id": "_:N76a6ce1a060d4760be82a172d993465b", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5456,7 +5045,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5472,13 +5061,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Concept representing Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5489,57 +5078,99 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightsObstructed", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5554,13 +5185,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5571,63 +5202,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" + "@value": "Rights Obstructed" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#ServiceProvisionDelayed", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5643,13 +5241,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5660,28 +5258,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Service Provision Delayed" } ] }, { - "@id": "https://w3id.org/dpv/risk#SelectionBias", + "@id": "https://w3id.org/dpv/risk#DataProcessingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5720,13 +5302,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5737,44 +5319,27 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Selection Bias" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", + "@id": "https://w3id.org/dpv/risk#Misogyny", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -5787,13 +5352,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Dislike, contempt, or prejudice against women" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5804,56 +5369,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Misogyny" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#LanguageDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5869,13 +5402,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5886,28 +5419,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" - } - ] - }, - { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Language Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5936,7 +5453,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neee39564ca4e493181200a260513b3de" + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5958,7 +5475,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Concept representing Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5969,12 +5486,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Neee39564ca4e493181200a260513b3de", + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9", "@type": [ "https://schema.org/WebPage" ], @@ -5989,6 +5506,44 @@ } ] }, + { + "@id": "https://w3id.org/dpv/risk#Privacy", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" + } + ] + }, { "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ @@ -6019,7 +5574,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N95204127ed924036926f89eb7e5b0678" + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6041,7 +5596,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Concept representing Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6057,7 +5612,7 @@ ] }, { - "@id": "_:N95204127ed924036926f89eb7e5b0678", + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3", "@type": [ "https://schema.org/WebPage" ], @@ -6073,15 +5628,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Harassment", + "@id": "https://w3id.org/dpv/risk#SexDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6095,7 +5656,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#Sexism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6106,20 +5673,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harassment" + "@value": "Sex Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept", "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ @@ -6141,7 +5706,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" + "@id": "_:N6f377135bda24668a1071c5670204b53" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6157,13 +5722,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Concept representing Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6174,51 +5739,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", + "@id": "_:N6f377135bda24668a1071c5670204b53", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6234,13 +5805,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + "@value": "Concept representing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6251,19 +5822,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Group Attribution Bias" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -6284,7 +5870,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" + "@id": "_:N37a077a62e9c415d99face23df8fac51" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6295,18 +5881,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Concept representing Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6317,12 +5906,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Violating Legal Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", + "@id": "_:N37a077a62e9c415d99face23df8fac51", "@type": [ "https://schema.org/WebPage" ], @@ -6338,7 +5933,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ReligiousDiscrimination", + "@id": "https://w3id.org/dpv/risk#IndirectDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6372,7 +5967,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's religious beliefs or practices" + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6383,35 +5978,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Religious Discrimination" + "@value": "Indirect Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#ViolatingProhibition", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6427,13 +6010,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6444,18 +6027,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Violating Prohibition" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6470,13 +6057,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Concept representing Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6487,12 +6074,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6500,28 +6087,12 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6537,13 +6108,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6554,46 +6125,73 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Organisational Risk Concept" } - ] + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Organisational in this context refers to an organisation which is not human but is managed by humans" + } + ] }, { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", + "@id": "https://w3id.org/dpv/risk#SexualHarassment", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sexual Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -6602,11 +6200,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6620,13 +6213,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#GroupRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Concept representing Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6637,28 +6230,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6666,17 +6243,17 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -6685,11 +6262,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6709,7 +6281,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Concept representing Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6720,35 +6292,71 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", + "@id": "https://w3id.org/dpv/risk#PersonalisationDisabled", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Personalisation Disabled" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6769,7 +6377,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N60882207c25442eab9509dc96896d91a" + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6785,13 +6393,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Concept representing Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6802,37 +6410,60 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Sabotage" } ] }, { - "@id": "_:N60882207c25442eab9509dc96896d91a", + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", "https://w3id.org/dpv/risk#AvailabilityConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6846,13 +6477,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Concept representing Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6863,18 +6494,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Malicious Code Attack" } + ] + }, + { + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#InabilityToProtectVitalInterests", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6883,6 +6524,12 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6896,13 +6543,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialLoss" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6913,12 +6560,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Inability to Protect Vital Interests" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6927,6 +6574,28 @@ "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -6940,13 +6609,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" + "@value": "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6957,119 +6626,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Activity" + "@value": "Human Errors" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Individual Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Social Disadvantage" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7090,7 +6676,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7106,13 +6692,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Concept representing System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7123,57 +6709,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#ImplicitBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9d18ac853d6249008536496d60a088cd" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7189,13 +6775,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7206,104 +6792,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:N9d18ac853d6249008536496d60a088cd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Implicit Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#PersonalisationEnabled", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7318,13 +6825,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7335,48 +6842,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Personalisation Enabled" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#RacialDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7392,13 +6875,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#Racism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Discrimination against individuals because of their racial background or skin color" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7409,228 +6892,238 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Racial Discrimination" } ] }, { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Benefit", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } - ], - "http://purl.org/dc/terms/created": [ + "@value": "Harshvardhan J. Pandit" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ + "@value": "Georg P. Krog" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@value": "Fajar Ekaputra" + }, { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Daniel Doherty" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Delaram Golpayegani" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Julian Flake" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/identifier": [ { - "@language": "en", - "@value": "Benefit" + "@value": "https://w3id.org/dpv/risk" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/issued": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "2022-08-14" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/license": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], "http://purl.org/dc/terms/modified": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "2024-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "_:N6177ab61947545c3b0f993f924c70c28" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/ontology/bibo/doi": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@value": "10.5281/zenodo.12505841" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/ontology/bibo/status": [ { - "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "risk" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@language": "en", - "@value": "Violence against children" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "RISK" } - ] - }, - { - "@id": "_:N6177ab61947545c3b0f993f924c70c28", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "2.1-dev" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ + "@id": "https://w3id.org/dpv/primer" + }, { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/version": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -7639,11 +7132,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -7657,13 +7145,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7674,28 +7162,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" - } - ] - }, - { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7704,7 +7176,8 @@ "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7725,7 +7198,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N366da704654a4b4682d8de807d0f1bef" + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7741,13 +7222,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Concept representing Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7758,40 +7239,101 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "Data Breach" } ] }, { - "@id": "_:N366da704654a4b4682d8de807d0f1bef", + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#DirectDiscrimination", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7807,13 +7349,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + "@value": "Concept representing Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7824,35 +7366,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Direct Discrimination" + "@value": "Confidentiality Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-06-11" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7868,13 +7426,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + "@value": "Concept representing a misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7885,20 +7443,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Simpson'S Paradox Bias" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -7919,7 +7476,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7935,13 +7492,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Concept representing Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7952,35 +7509,58 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk#CognitiveBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7995,7 +7575,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8006,12 +7592,73 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#Bias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8038,7 +7685,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8049,18 +7696,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Concept representing Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8071,18 +7718,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Public Order Breach" } ] }, { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299", "@type": [ "https://schema.org/WebPage" ], @@ -8098,14 +7739,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8126,7 +7768,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N58c7a823728a4bbc929c09b50030b836" + "@id": "_:Naca18964036346eea3a9e385d3a0bc12" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8142,13 +7784,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Concept representing System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8159,12 +7801,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N58c7a823728a4bbc929c09b50030b836", + "@id": "_:Naca18964036346eea3a9e385d3a0bc12", "@type": [ "https://schema.org/WebPage" ], @@ -8180,11 +7828,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RacialDiscrimination", + "@id": "https://w3id.org/dpv/risk#LoyaltyProgramExclusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" @@ -8192,7 +7840,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8208,13 +7856,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Racism" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals because of their racial background or skin color" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8225,249 +7873,2337 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Racial Discrimination" + "@value": "Loyalty Program Exclusion" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Code Disclosure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Code Disclosure" + } + ] + }, + { + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightsLimited", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" - }, + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RightsImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A limitation or restrictions on the scope or exercise of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rights Limited" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" - }, + } + ], + "http://purl.org/dc/terms/created": [ { - "@value": "Beatriz Esteves" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Loss of Reputation" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Lose of Reputation" + } + ] + }, + { + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Loss of Goodwill" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Lose of Goodwill" + } + ] + }, + { + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Homophobia", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Homophobia" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Extorsion", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1abbefd32bc845a7880d7b75d2794630" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Extorsion" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extorsion" + } + ] + }, + { + "@id": "_:N1abbefd32bc845a7880d7b75d2794630", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SelectionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised System Modification" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised System Modification" + } + ] + }, + { + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Earthquake", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The occurence or potential occurence of earthquakes" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Earthquake" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Harm", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Harm to humans" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N98503b14c8cf4817af92c366e96c81e7" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Code Access" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Code Access" + } + ] + }, + { + "@id": "_:N98503b14c8cf4817af92c366e96c81e7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4f06055416a84591bbecd622054f617d" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SecurityAttack" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Brute Force Authorisations" + } + ] + }, + { + "@id": "_:N4f06055416a84591bbecd622054f617d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A consequence related to the provision of a service" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Statistical Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Loss of Trust" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Lose of Trust" + } + ] + }, + { + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reward", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Renumeration" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reward" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Security Breach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Breach" + } + ] + }, + { + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6fecbc205414992aba88eb2c49114fb" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Sexual Violence" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sexual Violence" + } + ] + }, + { + "@id": "_:Na6fecbc205414992aba88eb2c49114fb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PublicServicesExclusion", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Public Services Exclusion" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Group Attribution Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InabilityToFulfillLegalObligations", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Fulfill Legal Obligations" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NationalityDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's nationality or citizenship" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Nationality Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InabilityToProcessPayments", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Process Payments" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Data Access" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Data Access" + } + ] + }, + { + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing an attack on security with the aim of undermining it" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Attack" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Fraud", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Fraud" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Fraud" + } + ] + }, + { + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EthnicDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Racism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Ethnic Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Georg P. Krog" - }, + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ { - "@value": "Axel Polleres" - }, + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ { - "@value": "Fajar Ekaputra" - }, + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "Julian Flake" - }, + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "Daniel Doherty" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Floods", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "Paul Ryan" - }, + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Rob Brennan" - }, + "@value": "The occurence or potential occurence of floods" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "Floods" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReverseDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Julian Flake" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "accepted" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-08-18" + "@value": "Reverse Discrimination" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ServiceLimited", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "Stub" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "risk" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Service Limited" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DirectDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "RISK" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, + "@id": "https://w3id.org/dpv/risk#Discrimination" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, + "@language": "en", + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "@language": "en", + "@value": "Direct Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#ConfirmationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8483,13 +10219,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8500,52 +10236,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk#CoverageBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8561,13 +10280,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8578,35 +10297,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#CognitiveBias", + "@id": "https://w3id.org/dpv/risk#LegalSupportLimited", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8622,13 +10330,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Bias" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8639,24 +10347,41 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cognitive Bias" + "@value": "Legal Support Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk#AgeDiscrimination", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8672,13 +10397,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's age, often impacting older or younger individuals" + "@value": "Concept representing Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8689,35 +10414,58 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Age Discrimination" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N985d9d3940a5494c898615fbbabe81ef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8733,13 +10481,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + "@value": "Concept representing Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8750,12 +10498,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confounding Variables Bias" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "_:N985d9d3940a5494c898615fbbabe81ef", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8784,7 +10548,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N636eafbaa808469aa226aaa74ca74855" + "@id": "_:Neca6b5963bf24a948454cd84f743913d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8795,18 +10559,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Concept representing Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8817,34 +10581,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N636eafbaa808469aa226aaa74ca74855", + "@id": "_:Neca6b5963bf24a948454cd84f743913d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misogyny", + "@id": "https://w3id.org/dpv/risk#Sexism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8872,13 +10630,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against women" + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8889,12 +10647,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misogyny" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8905,13 +10663,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8920,6 +10678,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8933,13 +10696,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Renumeration" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Concept representing Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8950,19 +10713,44 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Rights Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8972,7 +10760,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8981,6 +10769,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8994,13 +10787,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Concept representing Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9011,18 +10804,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "Unauthorised Access to Premises" + } + ] + }, + { + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#EthnicDiscrimination", + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9050,13 +10853,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Racism" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9067,20 +10870,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ethnic Discrimination" + "@value": "SexualOrientation Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9101,7 +10904,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8" + "@id": "_:Ndede7eca20f8479483447fce78fdad36" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9117,13 +10920,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Concept representing Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9134,50 +10937,45 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8", + "@id": "_:Ndede7eca20f8479483447fce78fdad36", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -9199,20 +10997,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - }, - { - "@id": "https://w3id.org/dpv/risk#RiskConcept" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" - }, - { - "@language": "en", - "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + "@value": "Concept representing Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9223,35 +11014,61 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalBias", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ServiceDenied", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9267,13 +11084,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9284,37 +11101,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Bias" + "@value": "Service Denied" } ] }, { - "@id": "https://w3id.org/dpv/risk#SamplingBias", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -9328,13 +11128,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" + "@value": "Concept represent an intentional misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9345,12 +11145,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sampling Bias" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9358,38 +11158,55 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", "https://w3id.org/dpv/risk#AvailabilityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightsViolated", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9405,13 +11222,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9422,51 +11239,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Rights Violated" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N877aeaa00e28404d96212fa2798843da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9482,13 +11294,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + "@value": "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9499,30 +11311,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rule-Based System Design" + "@value": "Financial Loss" } + ] + }, + { + "@id": "_:N877aeaa00e28404d96212fa2798843da", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LanguageDiscrimination", + "@id": "https://w3id.org/dpv/risk#NonNormalityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9538,13 +11371,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9555,18 +11388,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Language Discrimination" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ @@ -9588,7 +11422,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9604,13 +11438,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Concept representing Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9621,12 +11455,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66", "@type": [ "https://schema.org/WebPage" ], @@ -9642,47 +11476,113 @@ ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/risk#InabilityToProvideHealthCare", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Provide Health Care" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#ServiceSecurityReduced", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Service Security Reduced" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -9703,7 +11603,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" + "@id": "_:Na263f2c7d5914d86a7568447eb141586" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9714,18 +11614,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Concept representing Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9736,32 +11636,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", + "@id": "_:Na263f2c7d5914d86a7568447eb141586", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReverseDiscrimination", + "@id": "https://w3id.org/dpv/risk#IdentityVerificationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" @@ -9769,7 +11675,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9785,13 +11691,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + "@value": "Concept representing failure to verify identity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9802,40 +11708,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reverse Discrimination" + "@value": "Identity Verification Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#Misandry", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9851,13 +11741,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Dislike, contempt, or prejudice against men" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9868,36 +11758,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" - } - ] - }, - { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Misandry" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#ExcellenceDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -9911,13 +11791,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9928,12 +11808,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#InformativenessBias", + "@id": "https://w3id.org/dpv/risk#SamplingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9972,13 +11852,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9989,19 +11869,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Informativeness Bias" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", "https://w3id.org/dpv/risk#IntegrityConcept", "https://w3id.org/dpv/risk#AvailabilityConcept" ], @@ -10024,7 +11904,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1" + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10040,13 +11920,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Concept representing Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10057,51 +11937,94 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Malware Attack" } ] }, { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1", + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "User Risks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonResponseBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10117,13 +12040,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A limitation or restrictions on the scope or exercise of rights" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10134,18 +12057,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Non-Response Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10173,7 +12090,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10189,13 +12106,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Concept representing Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10206,57 +12123,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Violence against children" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataProcessingBias", + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10272,13 +12179,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10289,42 +12196,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Processing Bias" + "@value": "Societal Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#PolicyRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6" - } + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10339,13 +12228,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Risks and consequences regarding policy and its associated processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10356,48 +12245,29 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Policy Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10406,11 +12276,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nedb073eb260845019e04df25c90d654e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10424,13 +12289,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10441,78 +12306,84 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Compensation" } ] }, { - "@id": "_:Nedb073eb260845019e04df25c90d654e", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Georg P. Krog" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Risk Concepts - Turtle serialiation" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk.ttl" + "@language": "en", + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -10521,11 +12392,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10539,13 +12405,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Concept representing Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10556,35 +12422,42 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Detriment" } ] }, { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N61b2a56f52954abdab1d5175aec3c012" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10599,13 +12472,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Concept representing Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10616,21 +12489,43 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "_:N61b2a56f52954abdab1d5175aec3c012", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10651,7 +12546,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10667,13 +12562,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Concept representing System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10684,57 +12579,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "System Intrusion" } ] }, { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#InGroupBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10750,13 +12639,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10767,46 +12656,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndirectDiscrimination", + "@id": "https://w3id.org/dpv/risk#ViolatingObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10822,13 +12688,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" + "@value": "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10839,35 +12705,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Indirect Discrimination" + "@value": "Violating Obligation" } ] }, { - "@id": "https://w3id.org/dpv/risk#StatisticalBias", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO 20501:2019" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10883,13 +12749,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + "@value": "Concept representing Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10900,28 +12766,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Statistical Bias" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10943,13 +12816,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10960,39 +12833,68 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#GroupRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect groups in society" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#GenderDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11008,13 +12910,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11025,35 +12927,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11074,7 +12962,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11090,13 +12978,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Concept representing Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11107,12 +12995,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Spoofing" } ] }, { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba", "@type": [ "https://schema.org/WebPage" ], @@ -11128,31 +13016,13 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DataBias", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } + "https://w3id.org/dpv/risk#PotentialRisk" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11167,13 +13037,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Bias" + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11184,12 +13054,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Bias" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#ServiceCostIncreased", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11198,21 +13068,10 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11228,13 +13087,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11245,18 +13104,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Service Cost Increased" } ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11265,6 +13118,23 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -11278,7 +13148,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11289,7 +13165,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Damage" } ] } diff --git a/2.1-dev/risk/modules/risk_taxonomy.n3 b/2.1-dev/risk/modules/risk_taxonomy.n3 index d0e401bcc..4c31abb25 100644 --- a/2.1-dev/risk/modules/risk_taxonomy.n3 +++ b/2.1-dev/risk/modules/risk_taxonomy.n3 @@ -24,7 +24,7 @@ risk:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . @@ -58,7 +58,7 @@ risk:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -86,9 +86,10 @@ risk:Benefit a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Compensation ; - skos:definition "Something that acts as or causes benefits"@en ; + skos:definition "Concept representing benefits - both material and immaterial"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Benefit"@en . + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk:Bias a rdfs:Class, skos:Concept, @@ -101,7 +102,7 @@ risk:Bias a rdfs:Class, dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Bias"@en . @@ -122,7 +123,7 @@ risk:Blackmail a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . @@ -142,7 +143,7 @@ risk:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -176,7 +177,7 @@ risk:Coercion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . @@ -222,7 +223,7 @@ risk:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -237,7 +238,7 @@ risk:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -260,7 +261,7 @@ risk:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . @@ -280,7 +281,7 @@ risk:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -300,7 +301,7 @@ risk:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBreach ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -349,8 +350,9 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Copyright Violation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . @@ -385,10 +387,24 @@ risk:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . +risk:CustomerSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Customer Support Limited"@en . + risk:Damage a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -400,8 +416,8 @@ risk:Damage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . @@ -457,7 +473,7 @@ risk:DataBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityBreach ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . @@ -477,7 +493,7 @@ risk:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -498,6 +514,20 @@ risk:DataProcessingBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Processing Bias"@en . +risk:DelayedApplicationProcessing a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Delayed Application Processing"@en . + risk:DenialServiceAttack a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -513,7 +543,7 @@ risk:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -521,14 +551,15 @@ risk:Detriment a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, + risk:PotentialImpact, risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Detriment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . @@ -562,24 +593,33 @@ risk:DisabilityDiscrimination a rdfs:Class, risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept, - risk:SocietalRisk ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . +risk:DisproportionateEnergyConsumption a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -595,19 +635,34 @@ risk:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DenialServiceAttack ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk:EnvironmentalRisk a rdfs:Class, +risk:Earthquake a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Earthquake"@en . + +risk:EnvironmentalRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . @@ -628,7 +683,7 @@ risk:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -649,12 +704,12 @@ risk:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:ErroneousSystemUse a rdfs:Class, +risk:ErroneousUse a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -669,9 +724,9 @@ risk:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; + skos:definition "Concept representing erroneous use (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erroneous System Use"@en . + skos:prefLabel "Erroneous Use"@en . risk:EthnicDiscrimination a rdfs:Class, skos:Concept, @@ -715,8 +770,8 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Harmful Speech"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -727,7 +782,7 @@ risk:ExternalSecurityThreat a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . @@ -748,7 +803,7 @@ risk:Extorsion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . @@ -758,9 +813,10 @@ risk:FinancialImpact a rdfs:Class, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . @@ -780,10 +836,24 @@ risk:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . +risk:Floods a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Floods"@en . + risk:Fraud a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -800,7 +870,7 @@ risk:Fraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . @@ -848,6 +918,19 @@ risk:GroupAttributionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Group Attribution Bias"@en . +risk:GroupRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Societal Risk"@en . + risk:Harassment a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -872,7 +955,7 @@ risk:Harm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -906,7 +989,7 @@ risk:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . @@ -926,7 +1009,7 @@ risk:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . @@ -946,10 +1029,24 @@ risk:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . +risk:IdentityVerificationFailure a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Identity Verification Failure"@en . + risk:IllegalDataProcessing a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -963,8 +1060,8 @@ risk:IllegalDataProcessing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1001,6 +1098,90 @@ risk:InGroupBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "In-Group Bias"@en . +risk:InabilityToEnterIntoContract a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk:InabilityToEstablishLegalClaims a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk:InabilityToFulfillLegalObligations a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk:InabilityToProcessPayments a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Process Payments"@en . + +risk:InabilityToProtectVitalInterests a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk:InabilityToProvideHealthCare a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk:IndirectDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -1029,11 +1210,13 @@ risk:IndividualHealthSafety a rdfs:Class, risk:IndividualRisk a rdfs:Class, skos:Concept, + dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . @@ -1069,7 +1252,7 @@ risk:Injury a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . @@ -1094,7 +1277,7 @@ risk:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . @@ -1114,7 +1297,7 @@ risk:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1159,17 +1342,60 @@ risk:LanguageDiscrimination a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Language Discrimination"@en . -risk:LegalRisk a rdfs:Class, +risk:LegalComplianceRisk a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk:LegalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Legal Risk"@en . + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk:LegalSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Support Limited"@en . + +risk:LegallyRelevantConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legally Relevant Consequence"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, @@ -1186,7 +1412,7 @@ risk:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . @@ -1205,7 +1431,7 @@ risk:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . @@ -1224,7 +1450,7 @@ risk:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . @@ -1243,7 +1469,7 @@ risk:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . @@ -1262,7 +1488,7 @@ risk:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . @@ -1281,7 +1507,7 @@ risk:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . @@ -1300,10 +1526,24 @@ risk:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . +risk:LoyaltyProgramExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk:MaliciousActivity a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1334,7 +1574,7 @@ risk:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -1355,7 +1595,7 @@ risk:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . @@ -1370,8 +1610,8 @@ risk:MaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1416,7 +1656,7 @@ risk:Misuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . @@ -1445,8 +1685,8 @@ risk:NonMaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1490,11 +1730,27 @@ risk:OperationalSecurityRisk a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OrganisationalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk:OutGroupHomogeneityBias a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -1541,11 +1797,39 @@ risk:PersonalSafetyEndangerment a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . +risk:PersonalisationDisabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Disabled"@en . + +risk:PersonalisationEnabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Enabled"@en . + risk:PhishingScam a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1562,7 +1846,7 @@ risk:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . @@ -1581,7 +1865,7 @@ risk:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . @@ -1597,6 +1881,18 @@ risk:PhysicalHarm a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . +risk:PolicyRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Policy Risk"@en . + risk:Privacy a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1624,7 +1920,7 @@ risk:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . @@ -1641,11 +1937,25 @@ risk:PublicOrderBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Public Order Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . +risk:PublicServicesExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Public Services Exclusion"@en . + risk:RacialDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -1687,7 +1997,7 @@ risk:Reidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -1730,7 +2040,7 @@ risk:ReputationalRisk a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . @@ -1782,7 +2092,7 @@ risk:Reward a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . -risk:RightEroded a rdfs:Class, +risk:RightsDenied a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1791,26 +2101,12 @@ risk:RightEroded a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk:RightObstructed a rdfs:Class, - skos:Concept, - dpv:RiskConcept, - risk:PotentialConsequence, - risk:PotentialImpact, - risk:PotentialRisk ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RightsImpact ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsDenial a rdfs:Class, +risk:RightsEroded a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1819,12 +2115,12 @@ risk:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsExercisePrevention a rdfs:Class, +risk:RightsExercisePrevented a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1838,7 +2134,7 @@ risk:RightsExercisePrevention a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, @@ -1855,13 +2151,13 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Concept representing Impact to Rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsLimitation a rdfs:Class, +risk:RightsLimited a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1875,9 +2171,23 @@ risk:RightsLimitation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk:RightsObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsUnfulfilled a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1889,10 +2199,10 @@ risk:RightsUnfulfilled a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsViolation a rdfs:Class, +risk:RightsViolated a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1906,7 +2216,7 @@ risk:RightsViolation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RuleBasedSystemDesign a rdfs:Class, @@ -1943,7 +2253,7 @@ risk:Sabotage a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . @@ -1979,7 +2289,7 @@ risk:Scam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . @@ -1994,7 +2304,7 @@ risk:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . @@ -2016,7 +2326,7 @@ risk:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . @@ -2036,6 +2346,173 @@ risk:SelectionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Selection Bias"@en . +risk:ServiceAlternativeOffered a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Alternative Offered"@en . + +risk:ServiceCostIncreased a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Cost Increased"@en . + +risk:ServiceDenied a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Denied"@en . + +risk:ServiceLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Limited"@en . + +risk:ServiceNotProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Not Provided"@en . + +risk:ServicePartiallyProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Partially Provided"@en . + +risk:ServiceProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provided"@en . + +risk:ServiceProvisionDelayed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provision Delayed"@en . + +risk:ServiceQualityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Quality Reduced"@en . + +risk:ServiceRelatedConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:OrganisationalRiskConcept ; + skos:definition "A consequence related to the provision of a service"@en ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:ServiceSecurityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Security Reduced"@en . + +risk:ServiceTermination a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Termination"@en . + risk:SexDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -2105,7 +2582,7 @@ risk:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . @@ -2136,8 +2613,8 @@ risk:SocialDisadvantage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . @@ -2165,22 +2642,25 @@ risk:SocietalHealthSafety a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; + skos:broader risk:GroupRisk ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . -risk:SocietalRisk a rdfs:Class, +risk:SocietalRiskConcept a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, - risk:PotentialRisk ; + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Societal Risk"@en . + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk:Spoofing a rdfs:Class, skos:Concept, @@ -2199,7 +2679,7 @@ risk:Spoofing a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . @@ -2235,7 +2715,7 @@ risk:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -2257,7 +2737,7 @@ risk:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . @@ -2277,11 +2757,27 @@ risk:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk:TechnicalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk:Terrorism a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2296,8 +2792,8 @@ risk:Terrorism a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Terrorism"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . @@ -2333,7 +2829,7 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -2349,7 +2845,7 @@ risk:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -2370,7 +2866,7 @@ risk:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -2390,7 +2886,7 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -2410,7 +2906,7 @@ risk:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -2430,7 +2926,7 @@ risk:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -2450,7 +2946,7 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -2470,7 +2966,7 @@ risk:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -2490,7 +2986,7 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -2507,7 +3003,7 @@ risk:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -2527,7 +3023,7 @@ risk:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -2548,7 +3044,7 @@ risk:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -2568,7 +3064,7 @@ risk:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -2589,7 +3085,7 @@ risk:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -2610,7 +3106,7 @@ risk:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -2630,7 +3126,7 @@ risk:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -2641,7 +3137,7 @@ risk:UserRisks a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . @@ -2659,8 +3155,8 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -2678,10 +3174,11 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, @@ -2697,8 +3194,8 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -2716,12 +3213,26 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk:ViolatingObligation a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Obligation"@en . + risk:ViolatingPolicy a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2729,11 +3240,24 @@ risk:ViolatingPolicy a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . +risk:ViolatingProhibition a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Prohibition"@en . + risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2747,10 +3271,11 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, @@ -2768,7 +3293,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/modules/risk_taxonomy.rdf b/2.1-dev/risk/modules/risk_taxonomy.rdf index 6bb16e09d..573677446 100644 --- a/2.1-dev/risk/modules/risk_taxonomy.rdf +++ b/2.1-dev/risk/modules/risk_taxonomy.rdf @@ -12,18 +12,71 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-08-18 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Harshvardhan J. Pandit + Georg P. Krog + Fajar Ekaputra + Daniel Doherty + Axel Polleres + Beatriz Esteves + Julian Flake + Delaram Golpayegani + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + + + - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - - + Security Breach + Concept representing Security Breach + + 2022-08-17 2024-08-16 accepted @@ -31,118 +84,128 @@ - + - - - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - - 2022-08-17 + Misuse + Concept representing a misuse (of something) + + 2024-06-11 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - + - - - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - - 2022-08-17 + + Harm + Concept representing Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Cryptojacking - Something that acts as or causes Cryptojacking - - - 2022-08-17 - 2024-08-16 + + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + + + + + + Risk Concepts - JSON-LD serialiation + + - Religious Discrimination - Discrimination based on a person's religious beliefs or practices + Direct Discrimination + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) 2024-09-30 accepted - + - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large + Earthquake + The occurence or potential occurence of earthquakes + 2024-10-21 accepted - + - Reverse Discrimination - Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + Age Discrimination + Discrimination based on a person's age, often impacting older or younger individuals 2024-09-30 accepted + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations + Violating Legal Obligation + Concept representing Violation of Legal Obligations + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + 2022-08-17 2024-08-16 modified @@ -150,31 +213,32 @@ - + - Societal Health & Safety - + Individual Health & Safety + accepted - + - - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - + + + Sabotage + Concept representing Sabotage + + 2022-08-17 2024-08-16 accepted @@ -182,64 +246,50 @@ - + - + - - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - - 2022-08-17 - 2024-08-16 + Non-Normality Bias + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - - accepted - - - - - - - - - - - Racism - Prejudice or discrimination against people based on their race - - 2024-09-30 + Violating Obligation + Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + + 2024-10-21 accepted - + + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - + + System Failure + Concept representing System Failure + + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted @@ -247,73 +297,60 @@ - + - - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - - accepted - - - - - - - - - - - - Component Failure - Something that acts as or causes Component Failure - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Malicious Code Attack + Concept representing Malicious Code Attack + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - In-Group Bias - Bias that occurs when showing partiality to one's own group or own characteristics - - ISO/IEC 24027:2021 - 2024-09-13 + + Caste Discrimination + Discrimination based on a person's caste, a form of social stratification found in some cultures + + 2024-09-30 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - - - Risk Concepts - N3 serialiation + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Non-Response Bias - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population ISO/IEC 24027:2021 2024-09-13 @@ -322,99 +359,103 @@ - + - Financial Impact - Things that cause or have the potential to impact financial resources - + Service Not Provided + Stub + + 2024-10-21 accepted - + - - Intentional Misuse - Intentional Misuse - + User Risks + Concepts associated with risks that arise due to User or Human use + accepted - + - - - Re-identification - Something that acts as or causes Re-identification - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + + Distributed Denial of Service Attack (DDoS) + Concept representing Distributed Denial of Service Attack (DDoS) + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Malicious Activity - Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others - + + Fraud + Concept representing Fraud + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + - - - Unfulfilment of Rights - Failure to meet or complete the fulfilment of rights - - Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + + + Security Attack + Concept representing an attack on security with the aim of undermining it + accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure - - + + Lose of Negotiating Capacity + Concept representing Loss of Negotiating Capacity + + 2022-08-17 2024-08-16 accepted @@ -422,34 +463,32 @@ - + - - + - Informativeness Bias - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - - ISO/IEC 24027:2021 - 2024-09-13 + + Service Security Reduced + Stub + + 2024-10-21 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Lose of Credibility - Something that acts as or causes Loss of Credibility - - + Sexual Violence + Concept representing Sexual Violence + + 2022-08-17 2024-08-16 accepted @@ -457,62 +496,61 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + + - - Individual Health & Safety - + + Unauthorised Data Modification + Concept representing Unauthorised Data Modification + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 + Rights Limited + A limitation or restrictions on the scope or exercise of rights + + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Extorsion - Something that acts as or causes Extorsion - - - 2022-08-17 - 2024-08-16 + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + @@ -520,12 +558,10 @@ - - - Security Breach - Something that acts as or causes Security Breach - - + Extorsion + Concept representing Extorsion + + 2022-08-17 2024-08-16 accepted @@ -533,17 +569,18 @@ - + + - - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - + + Unauthorised Code Disclosure + Concept representing Unauthorised Code Disclosure + + 2022-08-17 2024-08-16 accepted @@ -551,17 +588,18 @@ - + + - - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - - + + Identity Fraud + Concept representing Identity Fraud + + 2022-08-17 2024-08-16 accepted @@ -569,35 +607,38 @@ - + + - - Limitation of Rights - A limitation or restrictions on the scope or exercise of rights - - This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2022-08-18 + + Equipment Malfunction + Concept representing Equipment Malfunction + + Here equipment refers to physical equipment + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + + - - - Physical Assault - Something that acts as or causes Physical Assault - - + + + Authorisation Failure + Concept representing Authorisation Failure + + 2022-08-17 2024-08-16 accepted @@ -605,35 +646,30 @@ - + - + - Out-Group Homogeneity Bias - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - - ISO/IEC 24027:2021 - 2024-09-13 + + accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - - Identity Fraud - Something that acts as or causes Identity Fraud - - + + Injury + Concept representing Injury + + 2022-08-17 2024-08-16 accepted @@ -641,69 +677,17 @@ - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-08-18 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Delaram Golpayegani - Harshvardhan J. Pandit - Beatriz Esteves - Georg P. Krog - Axel Polleres - Fajar Ekaputra - Julian Flake - Daniel Doherty - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - + - Impact to Rights - Something that acts as or causes Impact to Rights - - This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - + Lose of Credibility + Concept representing Loss of Credibility + + 2022-08-17 2024-08-16 accepted @@ -711,34 +695,90 @@ - + - - Misuse - Something that acts as or causes Misuse - - 2024-06-11 + + Personal Safety Endangerment + Concept representing Personal Safety Endangerment + + + 2022-08-17 2024-08-16 accepted - Delaram Golpayegani + Harshvardhan J. Pandit - + - + + + + + Cryptojacking + Concept representing Cryptojacking + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + - Sexism - Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - - 2024-09-30 + Lose of Opportunity + Concept representing Loss of Opportunity + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + Legal Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + + Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation + 2024-10-21 + accepted + + + + + + + + + + + + Societal Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + + Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure + 2024-10-21 accepted @@ -752,9 +792,9 @@ Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure + Concept representing Unauthorised Information Disclosure - + 2022-08-17 2024-08-16 accepted @@ -762,17 +802,18 @@ - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations + Violating Statutory Obligations + Concept representing Violation of Statutory Obligations + - This concept was called "ViolationContractualObligations" in DPV 2.0 - + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 modified @@ -780,17 +821,17 @@ - + - Lose of Reputation - Something that acts as or causes Loss of Reputation + Lose of Trust + Concept representing Loss of Trust - + 2022-08-17 2024-08-16 accepted @@ -798,44 +839,31 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - + - Age Discrimination - Discrimination based on a person's age, often impacting older or younger individuals - - 2024-09-30 + Harassment + accepted - + - - - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion + + Unauthorised Data Disclosure + Concept representing Unauthorised Data Disclosure - + 2022-08-17 2024-08-16 accepted @@ -843,114 +871,120 @@ - + - - Terrorism - Something that acts as or causes Terrorism - - + Violating Ethics Code + Concept representing Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Prevent Exercising of Rights - Actions or measures that prevent an individual or group from exercising their legal rights. - - This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2022-08-18 + Legal Support Limited + Stub + + 2024-10-21 + accepted + + + + + + + + + + + Detriment + Concept representing Detriment + + 2022-03-23 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - - + - Simpson'S Paradox Bias - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - - ISO/IEC 24027:2021 - 2024-09-13 + Violating Policy + Concept representing violation of policy which can be either internal or external policy + accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - + - Geographic Discrimination - Discrimination based on a person's geographical origin or residence - - 2024-09-30 + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - + - Rule-Based System Design - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - - Rule based system design also potentially introduces various forms of human cognitive bias - ISO/IEC 24027:2021 - 2024-09-13 + Erroneous Use + Concept representing erroneous use (of something) + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - - Coercion - Something that acts as or causes Coercion - - + + Psychological Harm + Concept representing Psychological Harm + + 2022-08-17 2024-08-16 accepted @@ -958,76 +992,65 @@ - + - - Operational Security Risk - Risks and issues that arise during operational processes - + + + Rights Obstructed + Interference with or blocking of the exercise of rights + + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - + - - - Intercept Communications - Something that acts as or causes Interception of Communications - - This concept was called "InterceptionCommunications" in DPV 2.0 - - 2022-08-17 + + Rights Violated + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 - modified - Harshvardhan J. Pandit + accepted + Georg P. Krog, Harshvardhan J. Pandit - + - - - Component Malfunction - Something that acts as or causes Component Malfunction - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted - - - - - - - Risk Concepts - HTML serialiation - - + + - - - Malware Attack - Something that acts as or causes Malware Attack - - + Unauthorised Data Access + Concept representing Unauthorised Data Access + + 2022-08-17 2024-08-16 accepted @@ -1035,55 +1058,52 @@ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Damage - Something that acts as or causes Damage - - 2022-03-30 - 2024-08-16 + Service Cost Increased + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - - - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - - 2022-08-17 - 2024-08-16 + Legal Compliance Risk + Risks and consequences regarding legal compliance and its violation + accepted - Harshvardhan J. Pandit - + + - - System Intrusion - Something that acts as or causes System Intrusion - - + Unauthorised Code Access + Concept representing Unauthorised Code Access + + 2022-08-17 2024-08-16 accepted @@ -1091,56 +1111,55 @@ - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - - + - Bias - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - - ISO/IEC 24027:2021 - 2024-09-13 + + Rights Impact + Concept representing Impact to Rights + + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Erosion of Rights - The gradual weakening or reduction of the scope and protection of rights - - Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Exposure to Harmful Speech + Concept representing Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - + + Lose of Reputation + Concept representing Loss of Reputation + + 2022-08-17 2024-08-16 accepted @@ -1148,34 +1167,49 @@ - + - - + - Non-Normality Bias - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - - ISO/IEC 24027:2021 - 2024-09-13 + + Service Provision Delayed + Stub + + 2024-10-21 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - Human Errors - Something that acts as or causes Human Errors - - + + Social Disadvantage + Concept representing Social Disadvantage + + 2022-08-19 + 2024-08-16 + accepted + Georg P. Krog + + + + + + + + + + + Physical Assault + Concept representing Physical Assault + + 2022-08-17 2024-08-16 accepted @@ -1183,49 +1217,48 @@ - + - + - - Confounding Variables Bias - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - - ISO/IEC 24027:2021 - 2024-09-13 + Operational Security Risk + Risks and issues that arise during operational processes + accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + + - - Nationality Discrimination - Discrimination based on a person's nationality or citizenship - - 2024-09-30 + + Component Failure + Concept representing Component Failure + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - + + + - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - + Unwanted Data Deletion + Concept representing Unwanted Data Deletion + + 2022-08-17 2024-08-16 accepted @@ -1233,22 +1266,28 @@ - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + - - Psychological Harm - Something that acts as or causes Psychological Harm - - + + Unwanted Disclosure of Data + Concept representing Unwanted Disclosure of Data + + 2022-08-17 2024-08-16 accepted @@ -1256,71 +1295,64 @@ - + - - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - 2022-08-17 - 2024-08-16 + Malicious Activity + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + accepted - Harshvardhan J. Pandit - + - + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 - 2024-08-16 + Homophobia + Hostility or prejudice against individuals who are or are perceived to be homosexual + + 2024-09-30 accepted - Georg P. Krog, Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + - - + - Data Bias - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - - ISO/IEC 24027:2021 - 2024-09-13 + + Inability to Fulfill Legal Obligations + Stub + + 2024-10-21 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + + + + + + Floods + The occurence or potential occurence of floods + + 2024-10-21 + accepted + + @@ -1330,9 +1362,9 @@ Lose of Goodwill - Something that acts as or causes Loss of Goodwill + Concept representing Loss of Goodwill - + 2022-08-17 2024-08-16 accepted @@ -1340,33 +1372,33 @@ - + - + - Caste Discrimination - Discrimination based on a person's caste, a form of social stratification found in some cultures - - 2024-09-30 + Disproportionate Energy Consumption + The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + + 2024-10-21 accepted - + - - Identity Theft - Something that acts as or causes Identity Theft - - + + Unauthorised Resource Use + Concept representing Unauthorised Resource Use + + 2022-08-17 2024-08-16 accepted @@ -1374,41 +1406,39 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Statistical Bias - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - - ISO 20501:2019 + Bias + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + ISO/IEC 24027:2021 2024-09-13 accepted Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - - - Sabotage - Something that acts as or causes Sabotage - - + Illegal Data Processing + Concept representing Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -1416,57 +1446,57 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + - - - - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser - - - 2022-08-17 - 2024-08-16 + Rule-Based System Design + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + Rule based system design also potentially introduces various forms of human cognitive bias + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Homophobia - Hostility or prejudice against individuals who are or are perceived to be homosexual - + Racial Discrimination + Discrimination against individuals because of their racial background or skin color + 2024-09-30 accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + + - Public Order Breach - Something that acts as or causes Public Order Breach - - + + + Unauthorised System Access + Concept representing Unauthorised System Access + + 2022-08-17 2024-08-16 accepted @@ -1474,42 +1504,66 @@ - + - + - User Risks - Concepts associated with risks that arise due to User or Human use - + + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + - - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 + + Data Corruption + Concept representing Corruption of Data + + This concept was called "Corruption Data" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit + + + + + + + + + + Public Order Breach + Concept representing Public Order Breach + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + @@ -1517,10 +1571,12 @@ - Blackmail - Something that acts as or causes Blackmail - - + + + Compromise Account + Concept representing a compromised account that is then used by the compromiser + + 2022-08-17 2024-08-16 accepted @@ -1528,30 +1584,26 @@ - + - + - - Misandry - Dislike, contempt, or prejudice against men - - 2024-09-30 - accepted + Violating Contractual Obligation + Concept representing Violation of Contractual Obligations + + + This concept was called "ViolationContractualObligations" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit - - - - - Examples for Data Privacy Vocabulary - - - - + @@ -1559,178 +1611,190 @@ - - - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - - 2022-08-17 + Re-identification + Concept representing Re-identification + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 2024-08-16 accepted Harshvardhan J. Pandit - + + - - - Discrimination - Something that acts as or causes Discrimination - Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate - - - 2022-08-19 - 2024-09-30 - 2024-08-16 + Intentional Misuse + Concept represent an intentional misuse (of something) + accepted - Georg P. Krog - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + Sexism + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + + 2024-09-30 accepted - + - + - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + Gender Discrimination + Discrimination based on a person's gender identity or gender expression + + 2024-09-30 accepted - Georg P. Krog - + - + + - - Judicial Costs - Something that involves or causes judicial costs to be paid - + Non-Response Bias + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + - + - Excellence Discrimination - Favoritism towards individuals deemed more competent or superior, often at the expense of others - - 2024-09-30 + Rights Eroded + The gradual weakening or reduction of the scope and protection of rights + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - + + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - + + Equipment Failure + Concept representing Equipment Failure + + Here equipment refers to physical equipment + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + + - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society + Organisational Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + Organisational in this context refers to an organisation which is not human but is managed by humans + 2024-10-21 accepted - + - + + - - Sexual Harassment - + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - + - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence - - - 2022-08-17 - 2024-08-16 + Loyalty Program Exclusion + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - - Fraud - Something that acts as or causes Fraud - - + + System Malfunction + Concept representing System Malfunction + + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted @@ -1738,18 +1802,23 @@ - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + - - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - - + Identity Theft + Concept representing Identity Theft + + 2022-08-17 2024-08-16 accepted @@ -1757,58 +1826,54 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Erroneous System Use - Something that acts as or causes Erroneous System Use - - - 2022-08-17 + + Non-Material Damage + Concept representing Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 - 2024-08-16 + Societal Risk + Risks and issues that affect or have the potential to affect groups in society + accepted - Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - + - - - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - - + + Terrorism + Concept representing Terrorism + + 2022-08-17 2024-08-16 accepted @@ -1816,144 +1881,121 @@ - - - - - - External Security Threat - Concepts associated with security threats that are likely to originate externally - - accepted - - - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - - 2022-08-17 + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - + - Misogyny - Dislike, contempt, or prejudice against women - - 2024-09-30 + Customer Support Limited + Concept representing customer support to be limited + + 2024-10-21 accepted - + - - Data Breach - Something that acts as or causes Data Breach - - + Unwanted Code Deletion + Concept representing Unwanted Code Deletion + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - + - - - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - 2022-08-17 - 2024-08-16 + + Service Provided + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + - Obstruction of Rights - Interference with or blocking of the exercise of rights - - In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Excellence Discrimination + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + 2024-09-30 accepted - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - - 2022-08-17 + Damage + Concept representing Damage + + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - - - Phishing Scam - Something that acts as or causes Phishing Scam - - + + Lose of Customer Confidence + Concept representing Loss of Customer Confidence + + 2022-08-17 2024-08-16 accepted @@ -1961,19 +2003,18 @@ - + - - - Equipment Failure - Something that acts as or causes Equipment Failure - - Here equipment refers to physical equipment - + + Violence against children + Concept representing Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -1981,121 +2022,108 @@ - + - + - Harassment - + Indirect Discrimination + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + + 2024-09-30 accepted - + - - + - Data Processing Bias - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - - ISO/IEC 24027:2021 - 2024-09-13 + + Financial Impact + Things that cause or have the potential to impact financial resources + + 2024-10-21 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - Societal Bias - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - - ISO/IEC 24027:2021 - 2024-09-13 + + Discrimination + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + + 2024-09-30 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Georg P. Krog - + - - - - - Spoofing - Something that acts as or causes Spoofing - - - 2022-08-17 - 2024-08-16 + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Harshvardhan J. Pandit - + - - - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - Here equipment refers to physical equipment - + Violating Code of Conduct + Concept representing Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - - + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - 2022-08-19 - 2024-08-16 + + Ethnic Discrimination + Discrimination against individuals based on their ethnicity or cultural heritage + + 2024-09-30 accepted - Georg P. Krog - + - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - + Requirements Bias + Bias that occurs in or during requirements creation + + Requirements bias also represents occasions for the human cognitive biases to manifest ISO/IEC 24027:2021 2024-09-13 accepted @@ -2103,258 +2131,261 @@ - + - + - Accidental Misuse - Accidental Misuse - + Data Processing Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + - - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form - - 2024-04-14 + + Unauthorised System Modification + Concept representing Unauthorised System Modification + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - Requirements Bias - Bias that occurs in or during requirements creation - - Requirements bias also represents occasions for the human cognitive biases to manifest - ISO/IEC 24027:2021 - 2024-09-13 + + Transphobia + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + 2024-09-30 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Physical Harm - + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - + - Detriment - Something that acts as or causes Detriment - - 2022-03-23 - 2024-08-16 + + Rights Unfulfilled + Failure to meet or complete the fulfilment of rights + + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - - - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - - 2022-08-17 - 2024-08-16 + + Inability to Establish Legal Claims + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + Legally Relevant Consequence + A consequence that is legally relevant i.e. actionable under law + accepted - Harshvardhan J. Pandit - + - + + - - Language Discrimination - Discrimination based on a person's language, often linked to national origin or ethnicity - - 2024-09-30 + Human Errors + Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + - - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - + + Denial of Service Attack (DoS) + Concept representing Denial of Service Attack (DoS) + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + - - Scam - Something that acts as or causes Scam - - - 2022-08-17 - 2024-08-16 + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - - Transphobia - Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - - 2024-09-30 + Violating Prohibition + Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract + + 2024-10-21 accepted - + - - - - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - - 2022-08-17 + + Benefit + Concept representing benefits - both material and immaterial + + Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - - - - - Guides for Data Privacy Vocabulary - - + + + + + + + + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + - - - - Authorisation Failure - Something that acts as or causes Authorisation Failure - - - 2022-08-17 - 2024-08-16 + + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Harshvardhan J. Pandit - + + + + + + + Risk Concepts - RDF/XML serialiation + + + - - - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - + Blackmail + Concept representing Blackmail + + 2022-08-17 2024-08-16 accepted @@ -2362,25 +2393,18 @@ - - - - - Primer for Data Privacy Vocabulary - - - - + + - - Injury - Something that acts as or causes Injury - - + + Coercion + Concept representing Coercion + + 2022-08-17 2024-08-16 accepted @@ -2388,92 +2412,113 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + - - Sex Discrimination - Discrimination based on a person's biological sex - - 2024-09-30 + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + + + + Unauthorised Activity + Concept representing Unauthorised Activity + accepted - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Denial of Rights - The refusal or withholding or denial of the existence or applicability of rights - - The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Identity Verification Failure + Concept representing failure to verify identity + + 2024-10-21 accepted - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + + - - Ethnic Discrimination - Discrimination against individuals based on their ethnicity or cultural heritage - - 2024-09-30 - accepted + + Intercept Communications + Concept representing Interception of Communications + + This concept was called "InterceptionCommunications" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + + - - - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + + + + Malware Attack + Concept representing Malware Attack + + 2022-08-17 2024-08-16 accepted @@ -2481,16 +2526,16 @@ - + - Sampling Bias - Bias that occurs when data records are not collected randomly from the intended population - + Cognitive Bias + Bias that occurs when humans are processing and interpreting information + ISO/IEC 24027:2021 2024-09-13 accepted @@ -2498,35 +2543,559 @@ - + + - - Violation of Rights - The infringement or breach of rights in a manner that constitues a 'violation' of those rights - - This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2022-08-18 + + Confidentiality Breach + Concept representing Confidentiality Breach + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Lose of Trust - Something that acts as or causes Loss of Trust - - + Service Alternative Offered + Stub + + 2024-10-21 + accepted + + + + + + + + + + + Inability to Process Payments + Stub + + 2024-10-21 + accepted + + + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + + + + Accidental Misuse + Concept representing accidental misuse (of something) + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + + 2024-10-21 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + Disability Discrimination + Discrimination against individuals based on physical or mental disabilities + + 2024-09-30 + accepted + + + + + + + + + + + Religious Discrimination + Discrimination based on a person's religious beliefs or practices + + 2024-09-30 + accepted + + + + + + + + + + + Inability to Enter Into Contract + Stub + + 2024-10-21 + accepted + + + + + + + + + + + Rights Exercise Prevented + Actions or measures that prevent an individual or group from exercising their legal rights. + + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + + + + + + Service Limited + Stub + + 2024-10-21 + accepted + + + + + + + + + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + + + + + + + Scam + Concept representing Scam + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + Technical Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + + Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes + 2024-10-21 + accepted + + + + + + + + + + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + + accepted + + + + + + + + + + + Misandry + Dislike, contempt, or prejudice against men + + 2024-09-30 + accepted + + + + + + + + + + + Personalisation Disabled + Stub + + 2024-10-21 + accepted + + + + + + + + + + + Service Partially Provided + Stub + + 2024-10-21 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + + + accepted + + + + + + + + + + + Sex Discrimination + Discrimination based on a person's biological sex + + 2024-09-30 + accepted + + + + + + + + + + + + + Spoofing + Concept representing Spoofing + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Racism + Prejudice or discrimination against people based on their race + + 2024-09-30 + accepted + + + + + + + + + + + Data Bias + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + Material Damage + Concept representing Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Nationality Discrimination + Discrimination based on a person's nationality or citizenship + + 2024-09-30 + accepted + + + + + + + + + + + Misogyny + Dislike, contempt, or prejudice against women + + 2024-09-30 + accepted + + + + + + + + + + + Service Termination + Stub + + 2024-10-21 + accepted + + + + + + + + + + + Inability to Protect Vital Interests + Stub + + 2024-10-21 + accepted + + + + + + + + + + + + + System Intrusion + Concept representing System Intrusion + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Societal Health & Safety + + accepted + + + + + + + + + + + Service Denied + Stub + + 2024-10-21 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + + Component Malfunction + Concept representing Component Malfunction + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + accepted + + + + + + + + + + + In-Group Bias + Bias that occurs when showing partiality to one's own group or own characteristics + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + Financial Loss + Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + 2022-08-17 2024-08-16 accepted @@ -2534,169 +3103,169 @@ - + - Privacy - + Physical Harm + accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Guides for Data Privacy Vocabulary + + - + - + - - + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + + + - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - + Data Breach + Concept representing Data Breach + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit + + - + - - - - - Risk Concepts - RDF/XML serialiation + + + + + Risk Concepts - HTML serialiation - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + - Data Corruption - Something that acts as or causes Corruption of Data - - This concept was called "Corruption Data" in DPV 2.0 - + + Unauthorised Access to Premises + Concept representing Unauthorised Access to Premises + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - - - - - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - + + + Inability to Provide Health Care + Stub + + 2024-10-21 accepted - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 - 2024-08-16 + Sexual Harassment + accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + Policy Risk + Risks and consequences regarding policy and its associated processes + + accepted - + - - + - Data Aggregation Bias - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - - ISO/IEC 24027:2021 - 2024-09-13 + + Rights Denied + The refusal or withholding or denial of the existence or applicability of rights + + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - System Malfunction - Something that acts as or causes System Malfunction - - Here system refers to both hardware and software systems - + + Phishing Scam + Concept representing Phishing Scam + + 2022-08-17 2024-08-16 accepted @@ -2704,16 +3273,41 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + + + + Delayed Application Processing + Concept representing delayed processing of applications + + 2024-10-21 + accepted + + + + - Confirmation Bias - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + ISO/IEC 24027:2021 2024-09-13 accepted @@ -2721,221 +3315,187 @@ - + - + + - - Racial Discrimination - Discrimination against individuals because of their racial background or skin color - - 2024-09-30 + + Unauthorised Code Modification + Concept representing Unauthorised Code Modification + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - + - Group Attribution Bias - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - - ISO/IEC 24027:2021 - 2024-09-13 + + Public Services Exclusion + Stub + + 2024-10-21 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + - - - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + + + Brute Force Authorisations + Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Gender Discrimination - Discrimination based on a person's gender identity or gender expression - + Language Discrimination + Discrimination based on a person's language, often linked to national origin or ethnicity + 2024-09-30 accepted - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - - 2022-08-17 - 2024-08-16 + A consequence related to the provision of a service + + 2024-10-21 accepted - Harshvardhan J. Pandit - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + + - - Sexual Violence - Something that acts as or causes Sexual Violence - - - 2022-08-17 + + Unauthorised Re-Identification + Concept representing Unauthorised Re-Identification + + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + - + - Indirect Discrimination - Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - - 2024-09-30 + Personalisation Enabled + Stub + + 2024-10-21 accepted - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + + - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Reputational Risk - Risks and issues that affect the reputation of the organisation - + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + - Cognitive Bias - Bias that occurs when humans are processing and interpreting information - - ISO/IEC 24027:2021 + Statistical Bias + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + ISO 20501:2019 2024-09-13 accepted Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Selection Bias - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + ISO/IEC 24027:2021 2024-09-13 accepted @@ -2943,79 +3503,116 @@ - + + + + + + + Risk Concepts - N3 serialiation + + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + - + - Disability Discrimination - Discrimination against individuals based on physical or mental disabilities - - 2024-09-30 + Service Quality Reduced + Stub + + 2024-10-21 accepted - + - SexualOrientation Discrimination - Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + Reverse Discrimination + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality 2024-09-30 accepted - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Examples for Data Privacy Vocabulary + + + + + + + + + + Risk Concepts - Turtle serialiation + + - Direct Discrimination - Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + SexualOrientation Discrimination + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual 2024-09-30 accepted - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - - - System Failure - Something that acts as or causes System Failure - - Here system refers to both hardware and software systems - + Copyright Violation + Concept representing Copyright Violation + + + 2022-08-17 2024-08-16 accepted @@ -3023,121 +3620,76 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Implicit Bias - Bias that occurs when a human makes an association or assumption based on their mental models and memories - - ISO/IEC 24027:2021 - 2024-09-13 + + Geographic Discrimination + Discrimination based on a person's geographical origin or residence + + 2024-09-30 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - - + + Privacy + accepted - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + - Copyright Violation - Something that acts as or causes Copyright Violation - - + + Compromise Account Credentials + Concept representing Account Credentials to be compromised + + 2022-08-17 2024-08-16 accepted @@ -3145,120 +3697,130 @@ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - - - Risk Concepts - JSON-LD serialiation - - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Primer for Data Privacy Vocabulary + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ENISA Threat Landscape for Ransomware Attacks 2022 https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + diff --git a/2.1-dev/risk/modules/risk_taxonomy.ttl b/2.1-dev/risk/modules/risk_taxonomy.ttl index d0e401bcc..4c31abb25 100644 --- a/2.1-dev/risk/modules/risk_taxonomy.ttl +++ b/2.1-dev/risk/modules/risk_taxonomy.ttl @@ -24,7 +24,7 @@ risk:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . @@ -58,7 +58,7 @@ risk:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -86,9 +86,10 @@ risk:Benefit a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Compensation ; - skos:definition "Something that acts as or causes benefits"@en ; + skos:definition "Concept representing benefits - both material and immaterial"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Benefit"@en . + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk:Bias a rdfs:Class, skos:Concept, @@ -101,7 +102,7 @@ risk:Bias a rdfs:Class, dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Bias"@en . @@ -122,7 +123,7 @@ risk:Blackmail a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . @@ -142,7 +143,7 @@ risk:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -176,7 +177,7 @@ risk:Coercion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . @@ -222,7 +223,7 @@ risk:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -237,7 +238,7 @@ risk:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -260,7 +261,7 @@ risk:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . @@ -280,7 +281,7 @@ risk:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -300,7 +301,7 @@ risk:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBreach ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -349,8 +350,9 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Copyright Violation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . @@ -385,10 +387,24 @@ risk:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . +risk:CustomerSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Customer Support Limited"@en . + risk:Damage a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -400,8 +416,8 @@ risk:Damage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . @@ -457,7 +473,7 @@ risk:DataBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityBreach ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . @@ -477,7 +493,7 @@ risk:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -498,6 +514,20 @@ risk:DataProcessingBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Processing Bias"@en . +risk:DelayedApplicationProcessing a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Delayed Application Processing"@en . + risk:DenialServiceAttack a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -513,7 +543,7 @@ risk:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -521,14 +551,15 @@ risk:Detriment a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, + risk:PotentialImpact, risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Detriment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . @@ -562,24 +593,33 @@ risk:DisabilityDiscrimination a rdfs:Class, risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept, - risk:SocietalRisk ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . +risk:DisproportionateEnergyConsumption a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -595,19 +635,34 @@ risk:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DenialServiceAttack ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . -risk:EnvironmentalRisk a rdfs:Class, +risk:Earthquake a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Earthquake"@en . + +risk:EnvironmentalRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . @@ -628,7 +683,7 @@ risk:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -649,12 +704,12 @@ risk:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:ErroneousSystemUse a rdfs:Class, +risk:ErroneousUse a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -669,9 +724,9 @@ risk:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; + skos:definition "Concept representing erroneous use (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erroneous System Use"@en . + skos:prefLabel "Erroneous Use"@en . risk:EthnicDiscrimination a rdfs:Class, skos:Concept, @@ -715,8 +770,8 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Harmful Speech"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -727,7 +782,7 @@ risk:ExternalSecurityThreat a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . @@ -748,7 +803,7 @@ risk:Extorsion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . @@ -758,9 +813,10 @@ risk:FinancialImpact a rdfs:Class, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . @@ -780,10 +836,24 @@ risk:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . +risk:Floods a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Floods"@en . + risk:Fraud a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -800,7 +870,7 @@ risk:Fraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . @@ -848,6 +918,19 @@ risk:GroupAttributionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Group Attribution Bias"@en . +risk:GroupRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Societal Risk"@en . + risk:Harassment a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -872,7 +955,7 @@ risk:Harm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -906,7 +989,7 @@ risk:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . @@ -926,7 +1009,7 @@ risk:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . @@ -946,10 +1029,24 @@ risk:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . +risk:IdentityVerificationFailure a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Identity Verification Failure"@en . + risk:IllegalDataProcessing a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -963,8 +1060,8 @@ risk:IllegalDataProcessing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1001,6 +1098,90 @@ risk:InGroupBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "In-Group Bias"@en . +risk:InabilityToEnterIntoContract a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk:InabilityToEstablishLegalClaims a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk:InabilityToFulfillLegalObligations a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk:InabilityToProcessPayments a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Process Payments"@en . + +risk:InabilityToProtectVitalInterests a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk:InabilityToProvideHealthCare a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk:IndirectDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -1029,11 +1210,13 @@ risk:IndividualHealthSafety a rdfs:Class, risk:IndividualRisk a rdfs:Class, skos:Concept, + dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . @@ -1069,7 +1252,7 @@ risk:Injury a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . @@ -1094,7 +1277,7 @@ risk:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . @@ -1114,7 +1297,7 @@ risk:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1159,17 +1342,60 @@ risk:LanguageDiscrimination a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Language Discrimination"@en . -risk:LegalRisk a rdfs:Class, +risk:LegalComplianceRisk a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk:LegalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Legal Risk"@en . + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk:LegalSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Support Limited"@en . + +risk:LegallyRelevantConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legally Relevant Consequence"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, @@ -1186,7 +1412,7 @@ risk:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . @@ -1205,7 +1431,7 @@ risk:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . @@ -1224,7 +1450,7 @@ risk:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . @@ -1243,7 +1469,7 @@ risk:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . @@ -1262,7 +1488,7 @@ risk:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . @@ -1281,7 +1507,7 @@ risk:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . @@ -1300,10 +1526,24 @@ risk:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . +risk:LoyaltyProgramExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk:MaliciousActivity a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1334,7 +1574,7 @@ risk:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -1355,7 +1595,7 @@ risk:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . @@ -1370,8 +1610,8 @@ risk:MaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1416,7 +1656,7 @@ risk:Misuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . @@ -1445,8 +1685,8 @@ risk:NonMaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -1490,11 +1730,27 @@ risk:OperationalSecurityRisk a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OrganisationalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk:OutGroupHomogeneityBias a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -1541,11 +1797,39 @@ risk:PersonalSafetyEndangerment a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . +risk:PersonalisationDisabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Disabled"@en . + +risk:PersonalisationEnabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Enabled"@en . + risk:PhishingScam a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1562,7 +1846,7 @@ risk:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . @@ -1581,7 +1865,7 @@ risk:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . @@ -1597,6 +1881,18 @@ risk:PhysicalHarm a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . +risk:PolicyRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Policy Risk"@en . + risk:Privacy a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1624,7 +1920,7 @@ risk:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . @@ -1641,11 +1937,25 @@ risk:PublicOrderBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Public Order Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . +risk:PublicServicesExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Public Services Exclusion"@en . + risk:RacialDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -1687,7 +1997,7 @@ risk:Reidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -1730,7 +2040,7 @@ risk:ReputationalRisk a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . @@ -1782,7 +2092,7 @@ risk:Reward a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . -risk:RightEroded a rdfs:Class, +risk:RightsDenied a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1791,26 +2101,12 @@ risk:RightEroded a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk:RightObstructed a rdfs:Class, - skos:Concept, - dpv:RiskConcept, - risk:PotentialConsequence, - risk:PotentialImpact, - risk:PotentialRisk ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RightsImpact ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsDenial a rdfs:Class, +risk:RightsEroded a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1819,12 +2115,12 @@ risk:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsExercisePrevention a rdfs:Class, +risk:RightsExercisePrevented a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1838,7 +2134,7 @@ risk:RightsExercisePrevention a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, @@ -1855,13 +2151,13 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Concept representing Impact to Rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsLimitation a rdfs:Class, +risk:RightsLimited a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1875,9 +2171,23 @@ risk:RightsLimitation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk:RightsObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsUnfulfilled a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1889,10 +2199,10 @@ risk:RightsUnfulfilled a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsViolation a rdfs:Class, +risk:RightsViolated a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -1906,7 +2216,7 @@ risk:RightsViolation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RuleBasedSystemDesign a rdfs:Class, @@ -1943,7 +2253,7 @@ risk:Sabotage a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . @@ -1979,7 +2289,7 @@ risk:Scam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . @@ -1994,7 +2304,7 @@ risk:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . @@ -2016,7 +2326,7 @@ risk:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . @@ -2036,6 +2346,173 @@ risk:SelectionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Selection Bias"@en . +risk:ServiceAlternativeOffered a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Alternative Offered"@en . + +risk:ServiceCostIncreased a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Cost Increased"@en . + +risk:ServiceDenied a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Denied"@en . + +risk:ServiceLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Limited"@en . + +risk:ServiceNotProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Not Provided"@en . + +risk:ServicePartiallyProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Partially Provided"@en . + +risk:ServiceProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provided"@en . + +risk:ServiceProvisionDelayed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provision Delayed"@en . + +risk:ServiceQualityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Quality Reduced"@en . + +risk:ServiceRelatedConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:OrganisationalRiskConcept ; + skos:definition "A consequence related to the provision of a service"@en ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:ServiceSecurityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Security Reduced"@en . + +risk:ServiceTermination a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Termination"@en . + risk:SexDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -2105,7 +2582,7 @@ risk:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . @@ -2136,8 +2613,8 @@ risk:SocialDisadvantage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . @@ -2165,22 +2642,25 @@ risk:SocietalHealthSafety a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; + skos:broader risk:GroupRisk ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . -risk:SocietalRisk a rdfs:Class, +risk:SocietalRiskConcept a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, - risk:PotentialRisk ; + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Societal Risk"@en . + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk:Spoofing a rdfs:Class, skos:Concept, @@ -2199,7 +2679,7 @@ risk:Spoofing a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . @@ -2235,7 +2715,7 @@ risk:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -2257,7 +2737,7 @@ risk:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . @@ -2277,11 +2757,27 @@ risk:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk:TechnicalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk:Terrorism a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2296,8 +2792,8 @@ risk:Terrorism a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Terrorism"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . @@ -2333,7 +2829,7 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -2349,7 +2845,7 @@ risk:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -2370,7 +2866,7 @@ risk:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -2390,7 +2886,7 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -2410,7 +2906,7 @@ risk:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -2430,7 +2926,7 @@ risk:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -2450,7 +2946,7 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -2470,7 +2966,7 @@ risk:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -2490,7 +2986,7 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -2507,7 +3003,7 @@ risk:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -2527,7 +3023,7 @@ risk:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -2548,7 +3044,7 @@ risk:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -2568,7 +3064,7 @@ risk:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -2589,7 +3085,7 @@ risk:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -2610,7 +3106,7 @@ risk:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -2630,7 +3126,7 @@ risk:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -2641,7 +3137,7 @@ risk:UserRisks a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . @@ -2659,8 +3155,8 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -2678,10 +3174,11 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, @@ -2697,8 +3194,8 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -2716,12 +3213,26 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk:ViolatingObligation a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Obligation"@en . + risk:ViolatingPolicy a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2729,11 +3240,24 @@ risk:ViolatingPolicy a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . +risk:ViolatingProhibition a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Prohibition"@en . + risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2747,10 +3271,11 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, @@ -2768,7 +3293,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/risk-en.html b/2.1-dev/risk/risk-en.html index d082f005d..35ffb9e3b 100644 --- a/2.1-dev/risk/risk-en.html +++ b/2.1-dev/risk/risk-en.html @@ -13,7 +13,7 @@ title: "Risk Concepts (RISK)", subtitle: "version 2.1-dev", publishDate: "2024-08-18", - specStatus: "CG-FINAL", + specStatus: "CG-DRAFT", group: "dpvcg", latestVersion: "https://w3id.org/dpv/risk", canonicalUri: "https://w3id.org/dpv/risk", @@ -643,33 +643,42 @@

    Core Concepts

    -
    -
    -

    Likelihood, Severity, and Levels

    -

    To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

    -
      -
    • Likelihood: -
        -
      • [=3LikelihoodLevels=] which contains 3 likelihood levels of [=HighLikelihood=] (0.75), [=ModerateLikelihood=] (0.5), and [=LowLikelihood=] (0.25)
      • -
      • [=5LikelihoodLevels=] which contains the 3 likelihood levels from [=3LikelihoodLevels=] as well as [=VeryHighLikelihood=] (0.9) and [=VeryLowLikelihood=] (0.1)
      • -
      • [=7LikelihoodLevels=] which contains the 5 likelihood levels from [=5LikelihoodLevels=] as well as [=ExtremelyHighLikelihood=] (0.99) and [=ExtremelyLowLikelihood=] (0.01)
      • -
    • -
    • Severity: -
        -
      • [=3SeverityLevels=] which contains 3 Severity levels of [=HighSeverity=] (0.75), [=ModerateSeverity=] (0.5), and [=LowSeverity=] (0.25)
      • -
      • [=5SeverityLevels=] which contains the 3 Severity levels from [=3SeverityLevels=] as well as [=VeryHighSeverity=] (0.9) and [=VeryLowSeverity=] (0.1)
      • -
      • [=7SeverityLevels=] which contains the 5 Severity levels from [=5SeverityLevels=] as well as [=ExtremelyHighSeverity=] (0.99) and [=ExtremelyLowSeverity=] (0.01)
      • -
    • -
    • RiskLevel: -
        -
      • [=3RiskLevels=] which contains 3 RiskLevel levels of [=HighRisk=] (0.75), [=ModerateRisk=] (0.5), and [=LowRisk=] (0.25)
      • -
      • [=5RiskLevels=] which contains the 3 RiskLevel levels from [=3RiskLevels=] as well as [=VeryHighRisk=] (0.9) and [=VeryLowRisk=] (0.1)
      • -
      • [=7RiskLevels=] which contains the 5 RiskLevel levels from [=5RiskLevels=] as well as [=ExtremelyHighRisk=] (0.99) and [=ExtremelyLowRisk=] (0.01)
      • -
    • -
    +
    +

    Risk Management

    +

    lorem ipsum

    +
    + +
    +

    Risk Assessment

    +

    lorem ipsum

    +
    + +
    +

    Likelihood, Severity, and Levels

    +

    To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

    +
      +
    • Likelihood: +
        +
      • [=3LikelihoodLevels=] which contains 3 likelihood levels of [=HighLikelihood=] (0.75), [=ModerateLikelihood=] (0.5), and [=LowLikelihood=] (0.25)
      • +
      • [=5LikelihoodLevels=] which contains the 3 likelihood levels from [=3LikelihoodLevels=] as well as [=VeryHighLikelihood=] (0.9) and [=VeryLowLikelihood=] (0.1)
      • +
      • [=7LikelihoodLevels=] which contains the 5 likelihood levels from [=5LikelihoodLevels=] as well as [=ExtremelyHighLikelihood=] (0.99) and [=ExtremelyLowLikelihood=] (0.01)
      • +
    • +
    • Severity: +
        +
      • [=3SeverityLevels=] which contains 3 Severity levels of [=HighSeverity=] (0.75), [=ModerateSeverity=] (0.5), and [=LowSeverity=] (0.25)
      • +
      • [=5SeverityLevels=] which contains the 3 Severity levels from [=3SeverityLevels=] as well as [=VeryHighSeverity=] (0.9) and [=VeryLowSeverity=] (0.1)
      • +
      • [=7SeverityLevels=] which contains the 5 Severity levels from [=5SeverityLevels=] as well as [=ExtremelyHighSeverity=] (0.99) and [=ExtremelyLowSeverity=] (0.01)
      • +
    • +
    • RiskLevel: +
        +
      • [=3RiskLevels=] which contains 3 RiskLevel levels of [=HighRisk=] (0.75), [=ModerateRisk=] (0.5), and [=LowRisk=] (0.25)
      • +
      • [=5RiskLevels=] which contains the 3 RiskLevel levels from [=3RiskLevels=] as well as [=VeryHighRisk=] (0.9) and [=VeryLowRisk=] (0.1)
      • +
      • [=7RiskLevels=] which contains the 5 RiskLevel levels from [=5RiskLevels=] as well as [=ExtremelyHighRisk=] (0.99) and [=ExtremelyLowRisk=] (0.01)
      • +
    • +
    -
      +
      • risk:3LikelihoodLevels: Scale with 3 Likelihood Levels from High to Low go to full definition @@ -951,6 +960,7 @@

        Likelihood, Severity, and Levels

      +
    @@ -1340,6 +1350,63 @@

    Taxonomies

    Potential Risk Sources

      +
    • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
    • +
    • + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • +
    • + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
          +
        • + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition + +
        • +
        • + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition + +
        • +
        • + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
            +
          • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition + +
          • +
          • + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition + +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition + +
    • +
    • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -1455,12 +1522,12 @@

        Potential Risk Sources

        go to full definition
        • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser go to full definition
        • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised go to full definition
        • @@ -1469,237 +1536,232 @@

          Potential Risk Sources

          go to full definition
          • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
          • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
          • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
          • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
          • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
          • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
          • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
          • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
          • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
          • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
          • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
        • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
          • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
          • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
          • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
            • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
          • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
          • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
          • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
        • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + risk:UnauthorisedActivity: Concept representing Unauthorised Activity go to full definition
          • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises go to full definition
          • - risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access go to full definition
          • - risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure go to full definition
          • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification go to full definition
          • - risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access go to full definition
          • - risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure go to full definition
          • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification go to full definition
          • - risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure go to full definition
          • - risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification go to full definition
          • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use go to full definition
          • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access go to full definition
          • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification go to full definition
          • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion go to full definition
          • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion go to full definition
          • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data go to full definition
        -
      • -
      • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition -
      • risk:OperationalSecurityRisk: Risks and issues that arise during operational processes go to full definition
        • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + risk:AuthorisationFailure: Concept representing Authorisation Failure go to full definition
        • - risk:ComponentFailure: Something that acts as or causes Component Failure + risk:ComponentFailure: Concept representing Component Failure go to full definition
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + risk:ComponentMalfunction: Concept representing Component Malfunction go to full definition
        • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
        • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
        • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
        • - risk:Reidentification: Something that acts as or causes Re-identification + risk:Reidentification: Concept representing Re-identification go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach + risk:SecurityBreach: Concept representing Security Breach go to full definition
          • - risk:DataBreach: Something that acts as or causes Data Breach + risk:DataBreach: Concept representing Data Breach go to full definition
            • @@ -1708,7 +1770,7 @@

              Potential Risk Sources

            • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + risk:ConfidentialityBreach: Concept representing Confidentiality Breach go to full definition
            • @@ -1722,47 +1784,17 @@

              Potential Risk Sources

          • - risk:SystemFailure: Something that acts as or causes System Failure + risk:SystemFailure: Concept representing System Failure go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction + risk:SystemMalfunction: Concept representing System Malfunction go to full definition
        • -
        • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition -
    @@ -1772,285 +1804,153 @@

    Potential Risk Sources

    Potential Risks

    • - risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - go to full definition -
        -
      • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
          -
        • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition - -
        • -
        • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
        • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
        • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
        • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
        • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
        • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
        • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition - -
        • -
        -
      • -
      • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition
        • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition - -
        • -
        • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition - -
        • -
        • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition - -
        • -
        • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:LegalComplianceRisk: Risks and consequences regarding legal compliance and its violation + go to full definition
          • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition - -
          • -
          • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition - -
          • -
          • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition -
              -
            • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
            • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:IllegalDataProcessing: Concept representing Illegal Processing of Data + go to full definition
            • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:PublicOrderBreach: Concept representing Public Order Breach + go to full definition
            • -
            -
          • -
          -
        • -
        -
      • -
      -
    • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
    • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
    • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
    • -
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - +
  • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:LegallyRelevantConsequence: A consequence that is legally relevant i.e. actionable under law + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition - -
    • -
    • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition -
        -
      • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition - -
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:MaterialDamage: Concept representing Material Damage + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:NonMaterialDamage: Concept representing Non-Material Damage + go to full definition
    • -
    -
  • - risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals - go to full definition -
      -
    • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
    • -
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition - -
    • -
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
    • @@ -2058,229 +1958,369 @@

      Potential Risks

      go to full definition
      • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
      • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
      • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
      • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
      • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
      • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
    • - risk:OperationalSecurityRisk: Risks and issues that arise during operational processes - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
            +
          • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
          • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
          • +
          +
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
              +
            • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
            • +
            +
          • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
          • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
          • +
          +
        • +
        +
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
        • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
        • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
          • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
        • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
      • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition
        • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate go to full definition
          • @@ -2399,58 +2439,16 @@

            Potential Risks

        • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition - -
        • -
        • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
        • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition
          • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition - -
          • -
          • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition - -
          • -
          • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition - -
          • -
          • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition - -
          • -
          • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition - -
          • -
          • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition - -
          • -
          • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition - -
          • -
          -
        • -
        • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + risk:SocialDisadvantage: Concept representing Social Disadvantage go to full definition
        • @@ -2460,161 +2458,131 @@

          Potential Risks

        • - risk:Terrorism: Something that acts as or causes Terrorism + risk:Terrorism: Concept representing Terrorism go to full definition
      • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition
      • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition -
      • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
      • -
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition - +
    • -
    • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition - +
  • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition - -
  • -
    -
    - -
    -

    Potential Consequences

    -
      + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -2726,98 +2694,79 @@

        Potential Consequences

    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition - -
    • -
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition - -
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
      • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:AuthorisationFailure: Concept representing Authorisation Failure + go to full definition
      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
      • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
      • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - -
      • -
      • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
      • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
      • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition
        • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:DataBreach: Concept representing Data Breach + go to full definition -
        • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition - +
        • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
        • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
        @@ -2825,257 +2774,271 @@

        Potential Consequences

    • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
    +
    + +
    +

    Potential Consequences

    +
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
        -
      • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:Detriment: Something that acts as or causes Detriment - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
      • - risk:IllegalDataProcessing: Something that acts as or causes Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
      • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:DataCorruption: Concept representing Corruption of Data + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
      • - risk:PublicOrderBreach: Something that acts as or causes Public Order Breach - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
      • -
      -
    • - risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others - go to full definition -
        + risk:EquipmentFailure: Concept representing Equipment Failure + go to full definition + +
      • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:EquipmentMalfunction: Concept representing Equipment Malfunction + go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud - go to full definition + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:ViolatingCodeOfConduct: Concept representing Violation of Code of Conduct + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:ViolatingEthicsCode: Concept representing Violation of Ethics Code + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition - -
        • + risk:ViolatingObligation: Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + go to full definition +
          • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
          • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
          • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
          • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
            -
          • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition - @@ -3083,379 +3046,487 @@

            Potential Consequences

        • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition -
            -
          • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition
            • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:Blackmail: Concept representing Blackmail + go to full definition
            • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:Coercion: Concept representing Coercion + go to full definition
            • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:Extorsion: Concept representing Extorsion + go to full definition
            • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:Fraud: Concept representing Fraud + go to full definition
            • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:IdentityFraud: Concept representing Identity Fraud + go to full definition
            • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:IdentityTheft: Concept representing Identity Theft + go to full definition
            • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:InterceptCommunications: Concept representing Interception of Communications + go to full definition
            • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:PhishingScam: Concept representing Phishing Scam + go to full definition
            • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:Sabotage: Concept representing Sabotage + go to full definition
            • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition -
            • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
                +
              • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition
              • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition
              • +
              +
            • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
              • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
                  +
                • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
                • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
                    +
                  • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
                      +
                    • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
                    • +
                    +
                  • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
                  • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
                • +
                +
              • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition
                • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:LoseCredibility: Concept representing Loss of Credibility + go to full definition
                • -
                +
              • + risk:LoseCustomerConfidence: Concept representing Loss of Customer Confidence + go to full definition +
              • -
              +
            • + risk:LoseGoodwill: Concept representing Loss of Goodwill + go to full definition +
            • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:LoseNegotiatingCapacity: Concept representing Loss of Negotiating Capacity + go to full definition
            • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:LoseOpportunity: Concept representing Loss of Opportunity + go to full definition
            • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition - +
            • +
            • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition +
              • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:CustomerSupportLimited: Concept representing customer support to be limited + go to full definition
              • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DelayedApplicationProcessing: Concept representing delayed processing of applications + go to full definition
              • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:IdentityVerificationFailure: Concept representing failure to verify identity + go to full definition
              • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:InabilityToEnterIntoContract: Stub + go to full definition
              • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:InabilityToEstablishLegalClaims: Stub + go to full definition
              • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition + risk:InabilityToFulfillLegalObligations: Stub + go to full definition
              • -
              +
            • + risk:InabilityToProcessPayments: Stub + go to full definition +
            • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:InabilityToProtectVitalInterests: Stub + go to full definition
            • - risk:SocietalHealthSafety: None - go to full definition + risk:InabilityToProvideHealthCare: Stub + go to full definition
            • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:LegalSupportLimited: Stub + go to full definition
            • -
            +
          • + risk:LoyaltyProgramExclusion: Stub + go to full definition +
          • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:PersonalisationDisabled: Stub + go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction - go to full definition + risk:PersonalisationEnabled: Stub + go to full definition
          • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition - +
          • +
          +
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition + +
        • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
            +
          • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
              +
            • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
            • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
            • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
            • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
            • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
            • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition
            • -
    -
    - -
    -

    Potential Impacts

    -
    • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
    • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition -
        + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition
        • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition
        • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
      • +
      +
    • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
    • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Concept representing Terrorism + go to full definition +
    @@ -3464,7 +3535,12 @@

    Potential Impacts

    go to full definition
    • - risk:Harm: Something that acts as or causes Harm to humans + risk:ExposureToHarmfulSpeech: Concept representing Harmful Speech + go to full definition + +
    • +
    • + risk:Harm: Concept representing Harm to humans go to full definition
      • @@ -3473,12 +3549,12 @@

        Potential Impacts

      • - risk:Injury: Something that acts as or causes Injury + risk:Injury: Concept representing Injury go to full definition
      • - risk:PhysicalAssault: Something that acts as or causes Physical Assault + risk:PhysicalAssault: Concept representing Physical Assault go to full definition
      • @@ -3488,7 +3564,7 @@

        Potential Impacts

      • - risk:PsychologicalHarm: Something that acts as or causes Psychological Harm + risk:PsychologicalHarm: Concept representing Psychological Harm go to full definition
      • @@ -3498,12 +3574,12 @@

        Potential Impacts

      • - risk:SexualViolence: Something that acts as or causes Sexual Violence + risk:SexualViolence: Concept representing Sexual Violence go to full definition
      • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence + risk:ViolenceAgainstChildren: Concept representing Child Violence go to full definition
      • @@ -3513,6 +3589,11 @@

        Potential Impacts

        risk:IndividualHealthSafety: None go to full definition + +
      • + risk:PersonalSafetyEndangerment: Concept representing Personal Safety Endangerment + go to full definition +
      • risk:Privacy: None @@ -3522,266 +3603,1860 @@

        Potential Impacts

    • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition -
          -
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
        • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
        • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
        • +
        +
      • +
      +
    • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
    • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
    • -
    -
  • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition
    • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition
      • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
        • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
        • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
        • +
        +
      • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
        • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
          • - risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
          • - risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
          • -
          +
        • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
            +
          • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition +
          • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
          • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
          • +
          +
        • +
        +
      • +
      +
    • +
    +
  • + +
  • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition
    • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition
    • - risk:Misandry: Dislike, contempt, or prejudice against men - go to full definition + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition
    • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition
    • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition
    • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition
    • -
    +
  • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition +
  • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition -
      + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
    • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition
    • -
    +
  • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition +
  • - +
  • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition +
  • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition
  • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition
  • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition -
      + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
    • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition
    • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition
    • +
    +
  • +
    +
    + +
    +

    Potential Impacts

    +
    • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
    • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
    • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
    • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
        • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
          • -
    -
    - -
    -

    Overview of Concepts and Roles

    - - - - - - - - - - - - - - +
  • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
  • +
  • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
  • + + + + +
  • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • +
  • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition + +
  • + + +
  • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
  • +
  • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition + +
  • + + + +
    +

    Technical Risk Concepts

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
        +
      • + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition + +
      • +
      • + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition + +
      • +
      • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
      • +
      • + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it + go to full definition +
          +
        • + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition + +
        • +
        • + risk:Cryptojacking: Concept representing Cryptojacking + go to full definition + +
        • +
        • + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) + go to full definition +
            +
          • + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) + go to full definition + +
          • +
          +
        • +
        • + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack + go to full definition + +
        • +
        • + risk:MalwareAttack: Concept representing Malware Attack + go to full definition + +
        • +
        • + risk:SystemIntrusion: Concept representing System Intrusion + go to full definition + +
        • +
        +
      • +
      • + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
          +
        • + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition + +
        • +
        • + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition + +
        • +
        • + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition + +
        • +
        • + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition + +
        • +
        • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
        • +
        • + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition + +
        • +
        • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition + +
        • +
        • + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition + +
        • +
        • + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition + +
        • +
        • + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
        • +
        • + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition + +
        • +
        • + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition + +
    • +
    +
    + +
    +

    Organisational Risk Concepts

    +
    +
    + +
    +

    Societal Risk Concepts

    +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
    + + + +
    +

    Overview of Concepts and Roles

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality
    + + + + + + + + + + + + + @@ -4007,6 +5682,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4067,6 +5752,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4082,7 +5777,7 @@

    Overview of Concepts and Roles

    - + @@ -4117,6 +5812,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4127,6 +5832,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4158,7 +5873,7 @@

    Overview of Concepts and Roles

    - + @@ -4237,6 +5952,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4277,6 +6002,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4337,6 +6072,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4357,6 +6102,66 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4478,13 +6283,43 @@

    Overview of Concepts and Roles

    - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4557,6 +6392,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4677,6 +6522,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4697,6 +6552,26 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + @@ -4737,6 +6612,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4767,6 +6652,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4858,7 +6753,7 @@

    Overview of Concepts and Roles

    - + @@ -4868,7 +6763,7 @@

    Overview of Concepts and Roles

    - + @@ -4878,7 +6773,7 @@

    Overview of Concepts and Roles

    - + @@ -4888,7 +6783,7 @@

    Overview of Concepts and Roles

    - + @@ -4898,7 +6793,7 @@

    Overview of Concepts and Roles

    - + @@ -4908,7 +6803,7 @@

    Overview of Concepts and Roles

    - + @@ -4928,7 +6823,7 @@

    Overview of Concepts and Roles

    - + @@ -5007,6 +6902,126 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -5098,8 +7113,8 @@

    Overview of Concepts and Roles

    - - + + @@ -5157,6 +7172,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5387,6 +7412,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5397,6 +7432,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5422,192 +7467,2009 @@

    Overview of Concepts and Roles

    - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    +
    + +
    +

    Rights Impacts

    +

    lorem ipsum

    +
    + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality Integrity Availability
    risk:CustomerSupportLimited
    risk:Damage
    risk:DelayedApplicationProcessing
    risk:DenialServiceAttack
    risk:DisproportionateEnergyConsumption
    risk:DistributedDenialServiceAttack
    risk:Earthquake
    risk:EnvironmentalRisk
    risk:ErroneousSystemUserisk:ErroneousUse
    risk:Floods
    risk:Fraud
    risk:GroupRisk
    risk:Harassment
    risk:IdentityVerificationFailure
    risk:IllegalDataProcessing
    risk:InabilityToEnterIntoContract
    risk:InabilityToEstablishLegalClaims
    risk:InabilityToFulfillLegalObligations
    risk:InabilityToProcessPayments
    risk:InabilityToProtectVitalInterests
    risk:InabilityToProvideHealthCare
    risk:IndirectDiscrimination
    risk:LegalRiskrisk:LegalComplianceRisk
    risk:LegallyRelevantConsequence
    risk:LegalRiskConcept
    risk:LegalSupportLimited
    risk:LoyaltyProgramExclusion
    risk:MaliciousActivity
    risk:OrganisationalRiskConcept
    risk:OutGroupHomogeneityBias
    risk:PersonalisationDisabled
    risk:PersonalisationEnabled
    risk:PersonalSafetyEndangerment
    risk:PolicyRisk
    risk:Privacy
    risk:PublicServicesExclusion
    risk:RacialDiscrimination
    risk:RightErodedrisk:RightsDenied
    risk:RightObstructedrisk:RightsEroded
    risk:RightsDenialrisk:RightsExercisePrevented
    risk:RightsExercisePreventionrisk:RightsImpact
    risk:RightsImpactrisk:RightsLimited
    risk:RightsLimitationrisk:RightsObstructed
    risk:RightsViolationrisk:RightsViolated
    risk:ServiceAlternativeOffered
    risk:ServiceCostIncreased
    risk:ServiceDenied
    risk:ServiceLimited
    risk:ServiceNotProvided
    risk:ServicePartiallyProvided
    risk:ServiceProvided
    risk:ServiceProvisionDelayed
    risk:ServiceQualityReduced
    risk:ServiceRelatedConsequence
    risk:ServiceSecurityReduced
    risk:ServiceTermination
    risk:SexDiscrimination
    risk:SocietalRiskrisk:SocietalRiskConcept
    risk:TechnicalRiskConcept
    risk:Terrorism
    risk:ViolatingObligation
    risk:ViolatingPolicy
    risk:ViolatingProhibition
    risk:ViolatingStatutoryObligations
    + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing accidental misuse (of something)
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 3x3

    -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    - - - - - + + + + + + + + + + - - - - + + + +
    LowModerateHigh
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + - - - - + + + + - - - - + + -
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]TermBenefitPrefixrisk
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]LabelBenefit
    -
    + + IRI + https://w3id.org/dpv/risk#Benefit + + + + + + Type + rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk + + + + Broader/Parent types + risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept + + + -
    -

    Risk Matrix 5x5

    - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + +
    Very LowLowModerateHighVery High
    DefinitionConcept representing benefits - both material and immaterial
    Usage NoteEven though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermBiasPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelBias
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]See More: section RISK-TAXONOMY in AI +
    + +
    - -
    -

    Risk Matrix 7x7

    - + + + + + + + +
    +

    Blackmail

    +
    + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely HighTermBlackmailPrefixrisk
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]TermBruteForceAuthorisationsPrefixrisk
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + - - - - - - - - + + + + - - - - - - - - + + -
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]TermCasteDiscriminationPrefixrisk
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]LabelCaste Discrimination
    -
    + + IRI + https://w3id.org/dpv/risk#CasteDiscrimination + + + + + + Type + rdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept + + + + Broader/Parent types + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept + + + + + + + + + + + + Definition + Discrimination based on a person's caste, a form of social stratification found in some cultures + + + -
    + + + + + + + Date Created + 2024-09-30 + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    @@ -5615,11 +9477,169 @@

    Classes

    +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    @@ -5627,21 +9647,251 @@

    Classes

    +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5649,7 +9899,76 @@

    Classes

    +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5657,7 +9976,76 @@

    Classes

    +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5667,7 +10055,85 @@

    Classes

    +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5675,7 +10141,85 @@

    Classes

    +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5683,44 +10227,43 @@

    Classes

    - -
    -

    3 Likelihood Levels

    +
    +

    Confidentiality Breach

    - + - + - + - + - - - - - + @@ -5729,22 +10272,28 @@

    3 Likelihood Levels

    - + - + + + + - + - + + + + @@ -5753,7 +10302,7 @@

    3 Likelihood Levels

    - @@ -5761,44 +10310,39 @@

    3 Likelihood Levels

    - -
    -

    3 Risk Levels

    +
    +

    Confidentiality Concept

    Term3LikelihoodLevelsConfidentialityBreach Prefix risk
    Label3 Likelihood LevelsConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to LowConcept representing Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -5807,9 +10351,12 @@

    3 Risk Levels

    - + - + + + + @@ -5820,7 +10367,7 @@

    3 Risk Levels

    - + @@ -5831,7 +10378,7 @@

    3 Risk Levels

    - @@ -5839,42 +10386,42 @@

    3 Risk Levels

    - -
    -

    3 Severity Levels

    +
    +

    Confidentiality Incident

    Term3RiskLevelsConfidentialityConcept Prefix risk
    Label3 Risk LevelsConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - @@ -5885,7 +10432,7 @@

    3 Severity Levels

    - + @@ -5898,18 +10445,15 @@

    3 Severity Levels

    - + - - - - + - @@ -5918,43 +10462,45 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Confirmation Bias

    Term3SeverityLevelsConfidentialityIncident Prefix risk
    Label3 Severity LevelsConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionScale with 3 Severity Levels from High to LowIncident where the confidentiality of information or system has been affected
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -5963,31 +10509,34 @@

    5 Likelihood Levels

    - + - + + + + - + - + - @@ -5996,43 +10545,46 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + +
    +

    Confounding Variables Bias

    Term5LikelihoodLevelsConfirmationBias Prefix risk
    Label5 Likelihood LevelsConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6041,31 +10593,34 @@

    5 Risk Levels

    - + - + + + + - + - + - @@ -6074,41 +10629,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    +
    +

    Consequence Control

    Term5RiskLevelsConfoundingVariablesBias Prefix risk
    Label5 Risk LevelsConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very LowBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -6119,7 +10678,7 @@

    5 Severity Levels

    - + @@ -6132,7 +10691,7 @@

    5 Severity Levels

    - + @@ -6143,7 +10702,7 @@

    5 Severity Levels

    - @@ -6152,41 +10711,45 @@

    5 Severity Levels

    -
    -

    7 Likelihood Levels

    +
    +

    Containment Control

    Term5SeverityLevelsConsequenceControl Prefix risk
    Label5 Severity LevelsConsequence Control
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 5 Severity Levels from Very High to Very LowRisk Mitigation Measure that controls the Consequences
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -6197,7 +10760,7 @@

    7 Likelihood Levels

    - + @@ -6210,18 +10773,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -6230,43 +10790,49 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + +
    +

    Copyright Violation

    Term7LikelihoodLevelsContainmentControl Prefix risk
    Label7 Likelihood LevelsContainment Control
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowControl to contain event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - + @@ -6275,22 +10841,28 @@

    7 Risk Levels

    - + - + + + + - + - + + + + @@ -6299,52 +10871,58 @@

    7 Risk Levels

    -
    Term7RiskLevelsCopyrightViolation Prefix risk
    Label7 Risk LevelsCopyright Violation
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowConcept representing Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    + + -
    -

    7 Severity Levels

    + + + +
    +

    Coverage Bias

    - + - + - + - + - - - - - + @@ -6353,31 +10931,34 @@

    7 Severity Levels

    - + - + + + + - + - + - @@ -6385,23 +10966,23 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    +
    +

    Cross-Border Incident

    Term7SeverityLevelsCoverageBias Prefix risk
    Label7 Severity LevelsCoverage Bias
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -6431,7 +11012,7 @@

    Accidental Incident

    - + @@ -6464,36 +11045,37 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    +
    +

    Cryptojacking

    TermAccidentalIncidentCrossBorderIncident Prefix risk
    LabelAccidental IncidentCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#CrossBorderIncident
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsIncident involving cross-border or multiple jurisdictions
    - + - + - + - + - @@ -6507,20 +11089,32 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + @@ -6537,40 +11131,36 @@

    Accidental Misuse

    -
    -

    Age Discrimination

    +
    +

    Customer Support Limited

    TermAccidentalMisuseCryptojacking Prefix risk
    LabelAccidental MisuseCryptojacking
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse - → risk:UserRisks + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionAccidental MisuseConcept representing Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - @@ -6584,7 +11174,7 @@

    Age Discrimination

    - + @@ -6597,7 +11187,7 @@

    Age Discrimination

    - + @@ -6617,36 +11207,36 @@

    Age Discrimination

    - -
    -

    Authorisation Failure

    +
    +

    Damage

    TermAgeDiscriminationCustomerSupportLimited Prefix risk
    LabelAge DiscriminationCustomer Support Limited
    IRIhttps://w3id.org/dpv/risk#AgeDiscriminationhttps://w3id.org/dpv/risk#CustomerSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's age, often impacting older or younger individualsConcept representing customer support to be limited
    Date Created2024-09-302024-10-21
    - + - + - + - + - @@ -6660,23 +11250,20 @@

    Authorisation Failure

    - + - - - - + - + @@ -6702,38 +11289,37 @@

    Authorisation Failure

    - -
    -

    None

    +
    +

    Data Aggregation Bias

    TermAuthorisationFailureDamage Prefix risk
    LabelAuthorisation FailureDamage
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureConcept representing Damage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -6745,19 +11331,31 @@

    None

    - + + + + - + + + + - + + + + - + + + + @@ -6770,35 +11368,41 @@

    None

    -
    -

    Availability Concept

    + + + + +
    +

    Data Bias

    TermAvailabilityBreachDataAggregationBias Prefix risk
    LabelNoneData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -6811,34 +11415,34 @@

    Availability Concept

    - + - - - - + - + + + + - + - + - @@ -6846,44 +11450,49 @@

    Availability Concept

    -
    -

    Availability Incident

    + + + + + + + +
    +

    Data Breach

    TermAvailabilityConceptDataBias Prefix risk
    LabelAvailability ConceptData Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcepthttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec modelBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Source
    Date Created2024-09-292024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6892,28 +11501,40 @@

    Availability Incident

    - + + + + - + + + + - + - - + + + + + + + + - @@ -6922,48 +11543,45 @@

    Availability Incident

    -
    -

    Avoid Source

    + + + + +
    +

    Data Corruption

    TermAvailabilityIncidentDataBreach Prefix risk
    LabelAvailability IncidentData Breach
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedConcept representing Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in DEX
    - + - + - + - + - - - - - + @@ -6972,22 +11590,31 @@

    Avoid Source

    - + - + + + + - + + + + - + - + + + + @@ -6996,7 +11623,7 @@

    Avoid Source

    - @@ -7008,37 +11635,37 @@

    Avoid Source

    -
    -

    Benefit

    +
    +

    Data Processing Bias

    TermAvoidSourceDataCorruption Prefix risk
    LabelAvoid SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcept representing Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7052,28 +11679,28 @@

    Benefit

    - + - + + + + - + - - - - + - + @@ -7091,35 +11718,37 @@

    Benefit

    -
    -

    Bias

    +
    +

    Delayed Application Processing

    TermBenefitDataProcessingBias Prefix risk
    LabelBenefitData Processing Bias
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Renumeration - → risk:FinancialImpact + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7132,34 +11761,28 @@

    Bias

    - + - - - - + - + - - - - + - @@ -7167,46 +11790,44 @@

    Bias

    - - - - - -
    -

    Blackmail

    +
    +

    Deliberate Incident

    TermBiasDelayedApplicationProcessing Prefix risk
    LabelBiasDelayed Application Processing
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#DelayedApplicationProcessing
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersConcept representing delayed processing of applications
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -7215,37 +11836,28 @@

    Blackmail

    - + - - - - + - + - - - - - - - - + + - @@ -7257,37 +11869,37 @@

    Blackmail

    - -
    -

    Brute Force Authorisations

    +
    +

    Denial of Service Attack (DoS)

    TermBlackmailDeliberateIncident Prefix risk
    LabelBlackmailDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes BlackmailIncident caused due to deliberate actions of a human
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + @@ -7301,7 +11913,7 @@

    Brute Force Authorisations

    - + @@ -7310,7 +11922,7 @@

    Brute Force Authorisations

    - + @@ -7340,48 +11952,47 @@

    Brute Force Authorisations

    - - - -
    -

    Caste Discrimination

    +
    +

    Detection Control

    TermBruteForceAuthorisationsDenialServiceAttack Prefix risk
    LabelBrute Force AuthorisationsDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesConcept representing Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - - - - + + + + @@ -7390,7 +12001,7 @@

    Caste Discrimination

    - + @@ -7403,7 +12014,7 @@

    Caste Discrimination

    - + @@ -7411,7 +12022,7 @@

    Caste Discrimination

    - @@ -7423,49 +12034,41 @@

    Caste Discrimination

    - -
    -

    Change Consequence

    +
    +

    Detriment

    TermCasteDiscriminationDetectionControl Prefix risk
    LabelCaste DiscriminationDetection Control
    IRIhttps://w3id.org/dpv/risk#CasteDiscriminationhttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some culturesControl to detect event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -7474,7 +12077,7 @@

    Change Consequence

    - + @@ -7487,18 +12090,21 @@

    Change Consequence

    - + - + + + + - + - @@ -7507,48 +12113,44 @@

    Change Consequence

    -
    -

    Change Impact

    + + + +
    +

    Direct Discrimination

    TermChangeConsequenceDetriment Prefix risk
    LabelChange ConsequenceDetriment
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ConsequenceConcept representing Detriment
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7557,7 +12159,7 @@

    Change Impact

    - + @@ -7570,18 +12172,15 @@

    Change Impact

    - + - - - - + - @@ -7593,37 +12192,36 @@

    Change Impact

    - -
    -

    Coercion

    +
    +

    Disability Discrimination

    TermChangeImpactDirectDiscrimination Prefix risk
    LabelChange ImpactDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ImpactOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2024-05-192024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7637,32 +12235,23 @@

    Coercion

    - + - - - - + - + - - - - - - - - + + @@ -7679,36 +12268,36 @@

    Coercion

    -
    -

    Cognitive Bias

    +
    +

    Discrimination

    TermCoercionDisabilityDiscrimination Prefix risk
    LabelCoercionDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes CoercionDiscrimination against individuals based on physical or mental disabilities
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7721,34 +12310,31 @@

    Cognitive Bias

    - + - - - - + - + - + - @@ -7760,23 +12346,23 @@

    Cognitive Bias

    -
    -

    Compensation

    +
    +

    Disproportionate Energy Consumption

    TermCognitiveBiasDiscrimination Prefix risk
    LabelCognitive BiasDiscrimination
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationDiscrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditGeorg P. Krog
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + @@ -7788,9 +12374,7 @@

    Compensation

    - @@ -7803,7 +12387,7 @@

    Compensation

    - + @@ -7816,16 +12400,10 @@

    Compensation

    - + - - - - - - - - + + @@ -7842,36 +12420,38 @@

    Compensation

    - -
    -

    Component Failure

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermCompensationDisproportionateEnergyConsumption Prefix risk
    LabelCompensationDisproportionate Energy Consumption
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#DisproportionateEnergyConsumption
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsThe occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised
    Date Created2024-04-142024-10-21
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7885,23 +12465,32 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + @@ -7918,37 +12507,35 @@

    Component Failure

    - -
    -

    Component Malfunction

    +
    +

    Earthquake

    TermComponentFailureDistributedDenialServiceAttack Prefix risk
    LabelComponent FailureDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureConcept representing Distributed Denial of Service Attack (DDoS)
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7961,12 +12548,9 @@

    Component Malfunction

    - + - - - - + @@ -7975,7 +12559,10 @@

    Component Malfunction

    - + + + + @@ -7990,47 +12577,44 @@

    Component Malfunction

    - - - - - - - -
    -

    Compromise Account

    +
    +

    Environmental Incident

    TermComponentMalfunctionEarthquake Prefix risk
    LabelComponent MalfunctionEarthquake
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#Earthquake
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionThe occurence or potential occurence of earthquakes
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-10-21
    - + - + - + - + - - + + + + @@ -8039,37 +12623,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -8081,36 +12656,35 @@

    Compromise Account

    - -
    -

    Compromise Account Credentials

    +
    +

    Environmental Risk

    TermCompromiseAccountEnvironmentalIncident Prefix risk
    LabelCompromise AccountEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8124,32 +12698,23 @@

    Compromise Account Credentials

    - + - - - - + - + - - - - - - - - + + @@ -8167,37 +12732,36 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Equipment Failure

    TermCompromiseAccountCredentialsEnvironmentalRisk Prefix risk
    LabelCompromise Account CredentialsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedRisks and issues that have their origin in environment or can affect the environment at large
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -8211,9 +12775,12 @@

    Confidentiality Breach

    - + - + + + + @@ -8249,35 +12816,42 @@

    Confidentiality Breach

    -
    -

    Confidentiality Concept

    + + + + + +
    +

    Equipment Malfunction

    TermConfidentialityBreachEquipmentFailure Prefix risk
    LabelConfidentiality BreachEquipment Failure
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Confidentiality BreachConcept representing Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    - + - + - + - + - @@ -8290,25 +12864,31 @@

    Confidentiality Concept

    - + - + - + + + + - + - + + + + @@ -8317,7 +12897,7 @@

    Confidentiality Concept

    - @@ -8325,44 +12905,45 @@

    Confidentiality Concept

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Erroneous Use

    TermConfidentialityConceptEquipmentMalfunction Prefix risk
    LabelConfidentiality ConceptEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcepthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec modelConcept representing Equipment Malfunction
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impactHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8371,28 +12952,37 @@

    Confidentiality Incident

    - + - + + + + - + - - + + + + + + + + - @@ -8404,37 +12994,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    +
    +

    Ethnic Discrimination

    TermConfidentialityIncidentErroneousUse Prefix risk
    LabelConfidentiality IncidentErroneous Use
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#ErroneousUse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affectedConcept representing erroneous use (of something)
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8447,29 +13038,23 @@

    Confirmation Bias

    - + - - - - + - + - - - - + @@ -8486,38 +13071,37 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    +
    +

    Excellence Discrimination

    TermConfirmationBiasEthnicDiscrimination Prefix risk
    LabelConfirmation BiasEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationDiscrimination against individuals based on their ethnicity or cultural heritage
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -8530,29 +13114,23 @@

    Confounding Variables Bias

    - + - - - - + - + - - - - + @@ -8566,47 +13144,46 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    + + + + + +
    +

    Exposure to Harmful Speech

    TermConfoundingVariablesBiasExcellenceDiscrimination Prefix risk
    LabelConfounding Variables BiasExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8615,22 +13192,31 @@

    Consequence Control

    - + - + + + + - + + + + - + - + + + + @@ -8639,7 +13225,7 @@

    Consequence Control

    - @@ -8648,47 +13234,41 @@

    Consequence Control

    -
    -

    Containment Control

    + +
    +

    External Security Threat

    TermConsequenceControlExposureToHarmfulSpeech Prefix risk
    LabelConsequence ControlExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the ConsequencesConcept representing Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8697,7 +13277,7 @@

    Containment Control

    - + @@ -8708,17 +13288,14 @@

    Containment Control

    - - - - + - @@ -8729,35 +13306,40 @@

    Containment Control

    -
    -

    Copyright Violation

    + + +
    +

    Extorsion

    TermContainmentControlExternalSecurityThreat Prefix risk
    LabelContainment ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain eventConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8770,7 +13352,7 @@

    Copyright Violation

    - + @@ -8779,7 +13361,7 @@

    Copyright Violation

    - + @@ -8806,51 +13388,47 @@

    Copyright Violation

    TermCopyrightViolationExtorsion Prefix risk
    LabelCopyright ViolationExtorsion
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ViolatingObligation + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationConcept representing Extorsion
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - - - - - -
    -

    Coverage Bias

    +
    +

    Extremely High Likelihood

    - + - + - + - + - - + + + + @@ -8859,34 +13437,34 @@

    Coverage Bias

    - + - + + + + - - - - + - + - + - @@ -8894,42 +13472,43 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Extremely High Risk

    TermCoverageBiasExtremelyHighLikelihood Prefix risk
    LabelCoverage BiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -8940,9 +13519,12 @@

    Cross-Border Incident

    - + - + + + + @@ -8953,15 +13535,18 @@

    Cross-Border Incident

    - + - + + + + - @@ -8970,44 +13555,44 @@

    Cross-Border Incident

    - - - -
    -

    Cryptojacking

    +
    +

    Extremely High Severity

    TermCrossBorderIncidentExtremelyHighRisk Prefix risk
    LabelCross-Border IncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionIncident involving cross-border or multiple jurisdictionsLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9016,28 +13601,25 @@

    Cryptojacking

    - + - + + + + - - - - + - + - - - - + @@ -9046,7 +13628,7 @@

    Cryptojacking

    - @@ -9055,43 +13637,44 @@

    Cryptojacking

    - - - -
    -

    Damage

    +
    +

    Extremely Low Likelihood

    TermCryptojackingExtremelyHighSeverity Prefix risk
    LabelCryptojackingExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CryptojackingLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Threat Landscape 2021
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9100,9 +13683,12 @@

    Damage

    - + - + + + + @@ -9113,12 +13699,9 @@

    Damage

    - + - - - - + @@ -9127,7 +13710,7 @@

    Damage

    - @@ -9136,44 +13719,44 @@

    Damage

    - - - -
    -

    Data Aggregation Bias

    +
    +

    Extremely Low Risk

    TermDamageExtremelyLowLikelihood Prefix risk
    LabelDamageExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes DamageLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9182,34 +13765,34 @@

    Data Aggregation Bias

    - + - + + + + - - - - + - + - + - @@ -9218,43 +13801,44 @@

    Data Aggregation Bias

    - - - -
    -

    Data Bias

    +
    +

    Extremely Low Severity

    TermDataAggregationBiasExtremelyLowRisk Prefix risk
    LabelData Aggregation BiasExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9263,34 +13847,34 @@

    Data Bias

    - + - + + + + - - - - + - + - + - @@ -9302,39 +13886,35 @@

    Data Bias

    - - - -
    -

    Data Breach

    +
    +

    Financial Impact

    TermDataBiasExtremelyLowSeverity Prefix risk
    LabelData BiasExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -9348,40 +13928,28 @@

    Data Breach

    - + - - - - - - - + - + - - - - - - - - + + - @@ -9393,36 +13961,36 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Financial Loss

    TermDataBreachFinancialImpact Prefix risk
    LabelData BreachFinancial Impact
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Data BreachThings that cause or have the potential to impact financial resources
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9436,12 +14004,9 @@

    Data Corruption

    - + - - - - + @@ -9481,37 +14046,35 @@

    Data Corruption

    -
    -

    Data Processing Bias

    +
    +

    Floods

    TermDataCorruptionFinancialLoss Prefix risk
    LabelData CorruptionFinancial Loss
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialImpact + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Corruption of DataConcept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    - + - + - + - + - @@ -9524,29 +14087,23 @@

    Data Processing Bias

    - + - - - - + - + - - - - + @@ -9559,44 +14116,47 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + + + + + +
    +

    Fraud

    TermDataProcessingBiasFloods Prefix risk
    LabelData Processing BiasFloods
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#Floods
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasThe occurence or potential occurence of floods
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9605,28 +14165,37 @@

    Deliberate Incident

    - + - + + + + - + - - + + + + + + + + - @@ -9638,36 +14207,37 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    Gender Discrimination

    TermDeliberateIncidentFraud Prefix risk
    LabelDeliberate IncidentFraud
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to deliberate actions of a humanConcept representing Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9681,32 +14251,23 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + @@ -9720,47 +14281,44 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    + + + +
    +

    Geographic Discrimination

    TermDenialServiceAttackGenderDiscrimination Prefix risk
    LabelDenial of Service Attack (DoS)Gender Discrimination
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Discrimination based on a person's gender identity or gender expression
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9769,7 +14327,7 @@

    Detection Control

    - + @@ -9782,7 +14340,7 @@

    Detection Control

    - + @@ -9790,7 +14348,7 @@

    Detection Control

    - @@ -9801,35 +14359,38 @@

    Detection Control

    -
    -

    Detriment

    + +
    +

    Group Attribution Bias

    TermDetectionControlGeographicDiscrimination Prefix risk
    LabelDetection ControlGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to detect eventDiscrimination based on a person's geographical origin or residence
    Date Created2024-05-192024-09-30
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9843,28 +14404,28 @@

    Detriment

    - + - + + + + - + - - - - + - + @@ -9882,40 +14443,35 @@

    Detriment

    -
    -

    Direct Discrimination

    +
    +

    Societal Risk

    TermDetrimentGroupAttributionBias Prefix risk
    LabelDetrimentGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes DetrimentBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -9929,7 +14485,7 @@

    Direct Discrimination

    - + @@ -9940,10 +14496,7 @@

    Direct Discrimination

    - - - - + @@ -9959,48 +14512,48 @@

    Direct Discrimination

    - - - -
    -

    Disability Discrimination

    +
    +

    Halt Source

    TermDirectDiscriminationGroupRisk Prefix risk
    LabelDirect DiscriminationSocietal Risk
    IRIhttps://w3id.org/dpv/risk#DirectDiscriminationhttps://w3id.org/dpv/risk#GroupRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)Risks and issues that affect or have the potential to affect groups in society
    Date Created2024-09-30
    - + - + - + - + - - - - + + + + @@ -10009,7 +14562,7 @@

    Disability Discrimination

    - + @@ -10022,15 +14575,18 @@

    Disability Discrimination

    - + - + + + + - @@ -10042,39 +14598,37 @@

    Disability Discrimination

    - -
    -

    Discrimination

    +
    +

    Harassment

    TermDisabilityDiscriminationHaltSource Prefix risk
    LabelDisability DiscriminationHalt Source
    IRIhttps://w3id.org/dpv/risk#DisabilityDiscriminationhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on physical or mental disabilitiesControl that halts the risk source or prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10086,10 +14640,7 @@

    Discrimination

    - - - - + @@ -10099,18 +14650,9 @@

    Discrimination

    - - - - - - - - - - - - + + + @@ -10127,37 +14669,36 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Harm

    TermDiscriminationHarassment Prefix risk
    LabelDiscriminationHarassment
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept -
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Definition[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2024-09-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    - + - + - + - + - @@ -10171,23 +14712,23 @@

    Distributed Denial of Service Attack (DDoS)

    - + - + + + + - - - - + - + @@ -10209,42 +14750,61 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    + + + + + + + + + + + +
    +

    High Likelihood

    TermDistributedDenialServiceAttackHarm Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Harm
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DenialServiceAttack - → risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Concept representing Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-13
    Date Modified
    - + - + - + - + - + + + + - @@ -10255,9 +14815,12 @@

    Environmental Incident

    - + - + + + + @@ -10268,15 +14831,18 @@

    Environmental Incident

    - + - + + + + - @@ -10285,42 +14851,52 @@

    Environmental Incident

    - - - -
    -

    Environmental Risk

    +
    +

    High Risk

    TermEnvironmentalIncidentHighLikelihood Prefix risk
    LabelEnvironmental IncidentHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to environmental factors outside human controlsLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10329,9 +14905,12 @@

    Environmental Risk

    - + - + + + + @@ -10340,14 +14919,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -10356,44 +14941,52 @@

    Environmental Risk

    - - - - -
    -

    Equipment Failure

    +
    +

    High Severity

    TermEnvironmentalRiskHighRisk Prefix risk
    LabelEnvironmental RiskHigh Risk
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10402,31 +14995,25 @@

    Equipment Failure

    - + - + - - - - + - + - - - - + @@ -10435,7 +15022,7 @@

    Equipment Failure

    - @@ -10447,36 +15034,37 @@

    Equipment Failure

    - -
    -

    Equipment Malfunction

    +
    +

    Homophobia

    TermEquipmentFailureHighSeverity Prefix risk
    LabelEquipment FailureHigh Severity
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Equipment FailureLevel where Severity is High
    Usage NoteHere equipment refers to physical equipmentThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -10490,35 +15078,23 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - - - - - + + @@ -10535,23 +15111,23 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Human Errors

    TermEquipmentMalfunctionHomophobia Prefix risk
    LabelEquipment MalfunctionHomophobia
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Equipment MalfunctionHostility or prejudice against individuals who are or are perceived to be homosexual
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -10564,6 +15140,7 @@

    Erroneous System Use

    @@ -10577,7 +15154,7 @@

    Erroneous System Use

    - + @@ -10586,7 +15163,7 @@

    Erroneous System Use

    - + @@ -10616,50 +15193,47 @@

    Erroneous System Use

    - - - -
    -

    Ethnic Discrimination

    +
    +

    Identification Control

    TermErroneousSystemUseHumanErrors Prefix risk
    LabelErroneous System UseHuman Errors
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#HumanErrors
    Broader/Parent types risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Erroneous System UseConcept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - - - - + + + + @@ -10668,7 +15242,7 @@

    Ethnic Discrimination

    - + @@ -10681,7 +15255,7 @@

    Ethnic Discrimination

    - + @@ -10689,7 +15263,7 @@

    Ethnic Discrimination

    - @@ -10701,40 +15275,38 @@

    Ethnic Discrimination

    -
    -

    Excellence Discrimination

    + +
    +

    Identity Fraud

    TermEthnicDiscriminationIdentificationControl Prefix risk
    LabelEthnic DiscriminationIdentification Control
    IRIhttps://w3id.org/dpv/risk#EthnicDiscriminationhttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on their ethnicity or cultural heritageControl to identify characteristics of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10748,23 +15320,32 @@

    Excellence Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -10782,36 +15363,37 @@

    Excellence Discrimination

    - -
    -

    Exposure to Harmful Speech

    +
    +

    Identity Theft

    TermExcellenceDiscriminationIdentityFraud Prefix risk
    LabelExcellence DiscriminationIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#ExcellenceDiscriminationhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of othersConcept representing Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -10825,19 +15407,16 @@

    Exposure to Harmful Speech

    - + - - - - + - + @@ -10868,35 +15447,39 @@

    Exposure to Harmful Speech

    -
    -

    External Security Threat

    + + +
    +

    Identity Verification Failure

    TermExposureToHarmfulSpeechIdentityTheft Prefix risk
    LabelExposure to Harmful SpeechIdentity Theft
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Harmful SpeechConcept representing Identity Theft
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - + - + - + - + - @@ -10909,7 +15492,7 @@

    External Security Threat

    - + @@ -10920,7 +15503,10 @@

    External Security Threat

    - + + + + @@ -10938,38 +15524,36 @@

    External Security Threat

    - - -
    -

    Extorsion

    +
    +

    Illegal Data Processing

    TermExternalSecurityThreatIdentityVerificationFailure Prefix risk
    LabelExternal Security ThreatIdentity Verification Failure
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IdentityVerificationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcepts associated with security threats that are likely to originate externallyConcept representing failure to verify identity
    Date Created2024-10-21
    - + - + - + - + - @@ -10983,16 +15567,19 @@

    Extorsion

    - + - + + + + - + @@ -11022,42 +15609,45 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Impact Control

    TermExtorsionIllegalDataProcessing Prefix risk
    LabelExtorsionIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ExtorsionConcept representing Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    - + - + - + - + - - @@ -11068,12 +15658,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -11084,7 +15671,7 @@

    Extremely High Likelihood

    - + @@ -11095,7 +15682,7 @@

    Extremely High Likelihood

    - @@ -11104,126 +15691,45 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    -
    TermExtremelyHighLikelihoodImpactControl Prefix risk
    LabelExtremely High LikelihoodImpact Control
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is Extremely HighRisk Mitigation Measure that controls Impacts
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighRiskPrefixrisk
    LabelExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Extremely High Severity

    +
    +

    Implicit Bias

    - + - + - + - + - - - - - + @@ -11232,34 +15738,34 @@

    Extremely High Severity

    - + - - - - + - + + + + - + - + - @@ -11268,44 +15774,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    + + + +
    +

    Inability to Enter Into Contract

    TermExtremelyHighSeverityImplicitBias Prefix risk
    LabelExtremely High SeverityImplicit Bias
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighBias that occurs when a human makes an association or assumption based on their mental models and memories
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11314,12 +15820,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -11330,18 +15833,15 @@

    Extremely Low Likelihood

    - + - - - - + - @@ -11350,44 +15850,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    + + + +
    +

    Inability to Establish Legal Claims

    TermExtremelyLowLikelihoodInabilityToEnterIntoContract Prefix risk
    LabelExtremely Low LikelihoodInability to Enter Into Contract
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#InabilityToEnterIntoContract
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11396,12 +15896,9 @@

    Extremely Low Risk

    - + - - - - + @@ -11412,18 +15909,15 @@

    Extremely Low Risk

    - + - - - - + - @@ -11432,44 +15926,44 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    + + + +
    +

    Inability to Fulfill Legal Obligations

    TermExtremelyLowRiskInabilityToEstablishLegalClaims Prefix risk
    LabelExtremely Low RiskInability to Establish Legal Claims
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#InabilityToEstablishLegalClaims
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11478,12 +15972,9 @@

    Extremely Low Severity

    - + - - - - + @@ -11494,18 +15985,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -11517,23 +16005,23 @@

    Extremely Low Severity

    -
    -

    Financial Impact

    +
    +

    Inability to Process Payments

    TermExtremelyLowSeverityInabilityToFulfillLegalObligations Prefix risk
    LabelExtremely Low SeverityInability to Fulfill Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#InabilityToFulfillLegalObligations
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -11545,7 +16033,9 @@

    Financial Impact

    - @@ -11558,7 +16048,7 @@

    Financial Impact

    - + @@ -11569,7 +16059,10 @@

    Financial Impact

    - + + + + @@ -11588,23 +16081,23 @@

    Financial Impact

    -
    -

    Financial Loss

    +
    +

    Inability to Protect Vital Interests

    TermFinancialImpactInabilityToProcessPayments Prefix risk
    LabelFinancial ImpactInability to Process Payments
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#InabilityToProcessPayments
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesStub
    Date Created2024-10-21
    - + - + - + @@ -11616,7 +16109,8 @@

    Financial Loss

    - @@ -11630,32 +16124,23 @@

    Financial Loss

    - + - - - - + - + - - - - - - - - + + @@ -11672,37 +16157,36 @@

    Financial Loss

    - -
    -

    Fraud

    +
    +

    Inability to Provide Health Care

    TermFinancialLossInabilityToProtectVitalInterests Prefix risk
    LabelFinancial LossInability to Protect Vital Interests
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#InabilityToProtectVitalInterests
    Broader/Parent types risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -11716,32 +16200,23 @@

    Fraud

    - + - - - - + - + - - - - - - - - + + @@ -11754,51 +16229,43 @@

    Fraud

    - - - - -
    -

    Gender Discrimination

    +
    +

    Incident

    TermFraudInabilityToProvideHealthCare Prefix risk
    LabelFraudInability to Provide Health Care
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#InabilityToProvideHealthCare
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes FraudStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -11807,10 +16274,16 @@

    Gender Discrimination

    - + + + + + - + + + @@ -11820,65 +16293,73 @@

    Gender Discrimination

    - + - - + + + + + + + + -
    TermGenderDiscriminationIncident Prefix risk
    LabelGender DiscriminationIncident
    IRIhttps://w3id.org/dpv/risk#GenderDiscriminationhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionDiscrimination based on a person's gender identity or gender expressionAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-09-302024-02-14
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-TAXONOMY in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - - - - -
    -

    Geographic Discrimination

    +
    +

    Incident Assessment Report

    - + - + - + - + - - - - + + + + @@ -11887,7 +16368,7 @@

    Geographic Discrimination

    - + @@ -11900,7 +16381,7 @@

    Geographic Discrimination

    - + @@ -11908,7 +16389,7 @@

    Geographic Discrimination

    - @@ -11917,44 +16398,46 @@

    Geographic Discrimination

    - - - -
    -

    Group Attribution Bias

    +
    +

    Incident Concluded

    TermGeographicDiscriminationIncidentAssessmentReport Prefix risk
    LabelGeographic DiscriminationIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#GeographicDiscriminationhttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionDiscrimination based on a person's geographical origin or residenceA report describing the assessment of an incident in terms of its effects or impacts
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -11963,34 +16446,31 @@

    Group Attribution Bias

    - + - - - - + - + - + - @@ -11998,47 +16478,46 @@

    Group Attribution Bias

    - -
    -

    Halt Source

    +
    +

    Incident Concluding Report

    TermGroupAttributionBiasIncidentConcluded Prefix risk
    LabelGroup Attribution BiasIncident Concluded
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -12049,7 +16528,7 @@

    Halt Source

    - + @@ -12065,15 +16544,12 @@

    Halt Source

    - - - - + - @@ -12081,51 +16557,58 @@

    Halt Source

    - - - - -
    -

    Harassment

    +
    +

    Incident Detection Report

    TermHaltSourceIncidentConcludingReport Prefix risk
    LabelHalt SourceIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl that halts the risk source or prevents it from materialisingA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + - + + + + @@ -12135,14 +16618,17 @@

    Harassment

    - + + + + - @@ -12151,42 +16637,46 @@

    Harassment

    - - - -
    -

    Harm

    +
    +

    Incident Halted

    TermHarassmentIncidentDetectionReport Prefix risk
    LabelHarassmentIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#Harassmenthttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionA report describing the detection of a Incident
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12195,12 +16685,9 @@

    Harm

    - + - - - - + @@ -12211,12 +16698,9 @@

    Harm

    - + - - - - + @@ -12225,7 +16709,7 @@

    Harm

    - @@ -12233,61 +16717,46 @@

    Harm

    - - - - - - - - - - - -
    -

    High Likelihood

    +
    +

    Incident Handling Report

    TermHarmIncidentHalted Prefix risk
    LabelHarmIncident Halted
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IndividualRisk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harm to humansThe incident has halted or paused with a high likelihood of resuming or recurring
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2022-08-132024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - @@ -12298,12 +16767,9 @@

    High Likelihood

    - + - - - - + @@ -12314,18 +16780,15 @@

    High Likelihood

    - + - - - - + - @@ -12333,53 +16796,36 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Incident Identifier

    TermHighLikelihoodIncidentHandlingReport Prefix risk
    LabelHigh LikelihoodIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is HighA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - + - - - - + @@ -12388,12 +16834,9 @@

    High Risk

    - + - - - - + @@ -12404,18 +16847,15 @@

    High Risk

    - + - - - - + - @@ -12423,51 +16863,49 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Incident Impact Assessment

    TermHighRiskIncidentIdentifier Prefix risk
    LabelHigh RiskIncident Identifier
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIdentifier associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - @@ -12478,12 +16916,9 @@

    High Severity

    - + - - - - + @@ -12494,7 +16929,7 @@

    High Severity

    - + @@ -12505,7 +16940,7 @@

    High Severity

    - @@ -12514,50 +16949,46 @@

    High Severity

    - - - -
    -

    Homophobia

    +
    +

    Incident Mitigated

    TermHighSeverityIncidentImpactAssessment Prefix risk
    LabelHigh SeverityIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is HighAn impact assessment associated with a incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -12566,7 +16997,7 @@

    Homophobia

    - + @@ -12579,15 +17010,18 @@

    Homophobia

    - + - + + + + - @@ -12595,44 +17029,45 @@

    Homophobia

    - - - - -
    -

    Human Errors

    +
    +

    Incident Mitigation Measure

    TermHomophobiaIncidentMitigated Prefix risk
    LabelHomophobiaIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#Homophobiahttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionHostility or prejudice against individuals who are or are perceived to be homosexualThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-09-302024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12641,37 +17076,28 @@

    Human Errors

    - + - - - - + - + - - - - - - - - + + - @@ -12680,45 +17106,44 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Incident Near Miss

    TermHumanErrorsIncidentMitigationMeasure Prefix risk
    LabelHuman ErrorsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Human ErrorsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -12729,7 +17154,7 @@

    Identification Control

    - + @@ -12742,15 +17167,18 @@

    Identification Control

    - + - + + + + - @@ -12758,46 +17186,47 @@

    Identification Control

    - - - - - -
    -

    Identity Fraud

    +
    +

    Incident Notice

    TermIdentificationControlIncidentNearMiss Prefix risk
    LabelIdentification ControlIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasContext, + dpv:hasStatus
    DefinitionControl to identify characteristics of eventThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12806,37 +17235,28 @@

    Identity Fraud

    - + - - - - + - + - - - - - - - - + + - @@ -12845,45 +17265,46 @@

    Identity Fraud

    - - - - -
    -

    Identity Theft

    +
    +

    Incident Ongoing

    TermIdentityFraudIncidentNotice Prefix risk
    LabelIdentity FraudIncident Notice
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Identity FraudNotice associated with an Incident
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12892,28 +17313,22 @@

    Identity Theft

    - + - - - - + - + - - - - + @@ -12922,7 +17337,7 @@

    Identity Theft

    - @@ -12930,43 +17345,48 @@

    Identity Theft

    - - - -
    -

    Illegal Data Processing

    +
    +

    Incident Ongoing Report

    TermIdentityTheftIncidentOngoing Prefix risk
    LabelIdentity TheftIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Identity TheftThe incident is ongoing i.e. still active
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12975,40 +17395,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -13016,46 +17424,46 @@

    Illegal Data Processing

    - -
    -

    Impact Control

    +
    +

    Incident Preliminary Report

    TermIllegalDataProcessingIncidentOngoingReport Prefix risk
    LabelIllegal Data ProcessingIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Illegal Processing of DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -13066,7 +17474,7 @@

    Impact Control

    - + @@ -13082,15 +17490,12 @@

    Impact Control

    - - - - + - @@ -13098,45 +17503,47 @@

    Impact Control

    - - - - -
    -

    Implicit Bias

    +
    +

    Incident Register

    TermImpactControlIncidentPreliminaryReport Prefix risk
    LabelImpact ControlIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that controls ImpactsA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -13145,34 +17552,31 @@

    Implicit Bias

    - + - - - - + - + - + - @@ -13180,23 +17584,23 @@

    Implicit Bias

    -
    -

    Incident

    +
    +

    Incident Report

    TermImplicitBiasIncidentRegister Prefix risk
    LabelImplicit BiasIncident Register
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesA register recording incidentes, their reports, notifications, and other related activities
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + @@ -13208,13 +17612,17 @@

    Incident

    - - @@ -13225,16 +17633,10 @@

    Incident

    - + - - - - - - - + @@ -13246,46 +17648,37 @@

    Incident

    - - - - - - - - + + -
    TermIncidentIncidentReport Prefix risk
    LabelIncidentIncident Report
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentReport
    Broader/Parent types dpv:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionAn actual or occured eventDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-05-19
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT in RISK
    - - -
    -

    Incident Assessment Report

    +
    +

    Incident Status

    - + - + - + @@ -13297,18 +17690,15 @@

    Incident Assessment Report

    - - @@ -13319,10 +17709,13 @@

    Incident Assessment Report

    - + + + + @@ -13332,15 +17725,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -13349,23 +17745,23 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Incident Status Unknown

    TermIncidentAssessmentReportIncidentStatus Prefix risk
    LabelIncident Assessment ReportIncident Status
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
    - + - + - + @@ -13397,7 +17793,7 @@

    Incident Concluded

    - + @@ -13429,46 +17825,45 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Incident Suspected

    TermIncidentConcludedIncidentStatusUnknown Prefix risk
    LabelIncident ConcludedIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe status of a incident is unknown
    - + - + - + - + - - @@ -13479,7 +17874,7 @@

    Incident Concluding Report

    - + @@ -13492,15 +17887,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -13508,23 +17906,23 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    +
    +

    Incident Suspected Report

    TermIncidentConcludingReportIncidentSuspected Prefix risk
    LabelIncident Concluding ReportIncident Suspected
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13558,7 +17956,7 @@

    Incident Detection Report

    - + @@ -13588,23 +17986,23 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Incident Terminated

    TermIncidentDetectionReportIncidentSuspectedReport Prefix risk
    LabelIncident Detection ReportIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentSuspectedReport
    DefinitionA report describing the detection of a IncidentA report describing the suspicion of an incident in the past or occuring
    - + - + - + @@ -13636,7 +18034,7 @@

    Incident Halted

    - + @@ -13668,48 +18066,45 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + + + + +
    +

    Indirect Discrimination

    TermIncidentHaltedIncidentTerminated Prefix risk
    LabelIncident HaltedIncident Terminated
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentTerminated
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + @@ -13718,7 +18113,7 @@

    Incident Handling Report

    - + @@ -13731,7 +18126,7 @@

    Incident Handling Report

    - + @@ -13739,7 +18134,7 @@

    Incident Handling Report

    - @@ -13747,33 +18142,42 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + + + + +
    +

    Individual Health & Safety

    TermIncidentHandlingReportIndirectDiscrimination Prefix risk
    LabelIncident Handling ReportIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + @@ -13783,10 +18187,7 @@

    Incident Identifier

    - - - - + @@ -13796,17 +18197,14 @@

    Incident Identifier

    - - - - + - @@ -13814,51 +18212,44 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + + + + +
    +

    Individual Risk

    TermIncidentIdentifierIndividualHealthSafety Prefix risk
    LabelIncident IdentifierIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13867,7 +18258,7 @@

    Incident Impact Assessment

    - + @@ -13878,20 +18269,14 @@

    Incident Impact Assessment

    - - - - + - - - - + - @@ -13900,46 +18285,42 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Informativeness Bias

    TermIncidentImpactAssessmentIndividualRisk Prefix risk
    LabelIncident Impact AssessmentIndividual Risk
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentRisks and issues that affect or have the potential to affect specific individuals
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13948,31 +18329,34 @@

    Incident Mitigated

    - + - + + + + - + - + - @@ -13980,45 +18364,46 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + +
    +

    In-Group Bias

    TermIncidentMitigatedInformativenessBias Prefix risk
    LabelIncident MitigatedInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:EngineeringDecisionBias
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    Source
    Date Created2024-02-142024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14027,28 +18412,34 @@

    Incident Mitigation Measure

    - + - + + + + - + - + + + + - @@ -14057,46 +18448,45 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + +
    +

    Injury

    TermIncidentMitigationMeasureInGroupBias Prefix risk
    LabelIncident Mitigation MeasureIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14105,22 +18495,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -14129,7 +18525,7 @@

    Incident Near Miss

    - @@ -14137,57 +18533,55 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + + +
    +

    None

    TermIncidentNearMissInjury Prefix risk
    LabelIncident Near MissInjury
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Concept representing Injury
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + - - - - + @@ -14197,17 +18591,14 @@

    Incident Notice

    - - - - + - @@ -14215,47 +18606,39 @@

    Incident Notice

    - -
    -

    Incident Ongoing

    +
    +

    Integrity Concept

    TermIncidentNoticeIntegrityBreach Prefix risk
    LabelIncident NoticeNone
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an Incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14264,9 +18647,12 @@

    Incident Ongoing

    - + - + + + + @@ -14277,7 +18663,7 @@

    Incident Ongoing

    - + @@ -14288,7 +18674,7 @@

    Incident Ongoing

    - @@ -14296,23 +18682,23 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    +
    +

    Integrity Incident

    TermIncidentOngoingIntegrityConcept Prefix risk
    LabelIncident OngoingIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-02-142024-09-29
    See More: section INCIDENT-STATUS in RISK + section CORE in RISK
    - + - + - + @@ -14324,18 +18710,14 @@

    Incident Ongoing Report

    - - @@ -14346,7 +18728,7 @@

    Incident Ongoing Report

    - + @@ -14375,48 +18757,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Intentional Misuse

    TermIncidentOngoingReportIntegrityIncident Prefix risk
    LabelIncident Ongoing ReportIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#IntegrityIncident
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + risk:hasIncident
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedIncident where the integrity of information or system has been affected
    - + - + - + - + - - - - - + @@ -14425,7 +18805,7 @@

    Incident Preliminary Report

    - + @@ -14436,17 +18816,14 @@

    Incident Preliminary Report

    - - - - + - @@ -14454,47 +18831,47 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + + + + + +
    +

    Intercept Communications

    TermIncidentPreliminaryReportIntentionalMisuse Prefix risk
    LabelIncident Preliminary ReportIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownConcept represent an intentional misuse (of something)
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14503,22 +18880,31 @@

    Incident Register

    - + - + + + + - + + + + - + - + + + + @@ -14527,7 +18913,7 @@

    Incident Register

    - @@ -14535,47 +18921,50 @@

    Incident Register

    -
    -

    Incident Report

    + + + + + + + + +
    +

    Judicial Costs

    TermIncidentRegisterInterceptCommunications Prefix risk
    LabelIncident RegisterIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesConcept representing Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14584,7 +18973,7 @@

    Incident Report

    - + @@ -14595,17 +18984,14 @@

    Incident Report

    - - - - + - @@ -14613,45 +18999,46 @@

    Incident Report

    -
    -

    Incident Status

    + + + + +
    +

    Judicial Penalty

    TermIncidentReportJudicialCosts Prefix risk
    LabelIncident ReportJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that involves or causes judicial costs to be paid
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14660,13 +19047,10 @@

    Incident Status

    - + - - - @@ -14674,20 +19058,14 @@

    Incident Status

    - - - - + - - - - + - @@ -14696,46 +19074,44 @@

    Incident Status

    -
    -

    Incident Status Unknown

    + + + +
    +

    Language Discrimination

    TermIncidentStatusJudicialPenalty Prefix risk
    LabelIncident StatusJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Status - → dpv:Context + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that involves or causes judicial penalties to be paid
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14744,7 +19120,7 @@

    Incident Status Unknown

    - + @@ -14757,18 +19133,15 @@

    Incident Status Unknown

    - + - - - - + - @@ -14777,46 +19150,42 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    + + +
    +

    Legal Compliance Risk

    TermIncidentStatusUnknownLanguageDiscrimination Prefix risk
    LabelIncident Status UnknownLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe status of a incident is unknownDiscrimination based on a person's language, often linked to national origin or ethnicity
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14825,7 +19194,7 @@

    Incident Suspected

    - + @@ -14836,20 +19205,14 @@

    Incident Suspected

    - - - - + - - - - + - @@ -14857,48 +19220,44 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + + + + +
    +

    Legally Relevant Consequence

    TermIncidentSuspectedLegalComplianceRisk Prefix risk
    LabelIncident SuspectedLegal Compliance Risk
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#LegalComplianceRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisks and consequences regarding legal compliance and its violation
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14907,7 +19266,7 @@

    Incident Suspected Report

    - + @@ -14918,17 +19277,14 @@

    Incident Suspected Report

    - - - - + - @@ -14937,46 +19293,43 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    + + + + +
    +

    Legal Risk Concept

    TermIncidentSuspectedReportLegallyRelevantConsequence Prefix risk
    LabelIncident Suspected ReportLegally Relevant Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#LegallyRelevantConsequence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the suspicion of an incident in the past or occuringA consequence that is legally relevant i.e. actionable under law
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14985,9 +19338,12 @@

    Incident Terminated

    - + - + + + + @@ -14998,18 +19354,15 @@

    Incident Terminated

    - + - - - - + - @@ -15021,40 +19374,36 @@

    Incident Terminated

    -
    -

    Indirect Discrimination

    +
    +

    Legal Support Limited

    TermIncidentTerminatedLegalRiskConcept Prefix risk
    LabelIncident TerminatedLegal Risk Concept
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#LegalRiskConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringRisk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process
    Usage NoteLegal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -15068,7 +19417,7 @@

    Indirect Discrimination

    - + @@ -15081,7 +19430,7 @@

    Indirect Discrimination

    - + @@ -15101,23 +19450,23 @@

    Indirect Discrimination

    -
    -

    Individual Health & Safety

    +
    +

    Lose of Credibility

    TermIndirectDiscriminationLegalSupportLimited Prefix risk
    LabelIndirect DiscriminationLegal Support Limited
    IRIhttps://w3id.org/dpv/risk#IndirectDiscriminationhttps://w3id.org/dpv/risk#LegalSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justifiedStub
    Date Created2024-09-302024-10-21
    - + - + - + @@ -15129,7 +19478,9 @@

    Individual Health & Safety

    - @@ -15140,19 +19491,34 @@

    Individual Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15168,33 +19534,39 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Lose of Customer Confidence

    TermIndividualHealthSafetyLoseCredibility Prefix risk
    LabelIndividual Health & SafetyLose of Credibility
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LoseCredibility
    Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcept representing Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - + + + @@ -15206,20 +19578,32 @@

    Individual Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -15236,35 +19620,37 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Lose of Goodwill

    TermIndividualRiskLoseCustomerConfidence Prefix risk
    LabelIndividual RiskLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsConcept representing Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15277,7 +19663,7 @@

    Informativeness Bias

    - + @@ -15286,19 +19672,22 @@

    Informativeness Bias

    - + - + - + + + + - + @@ -15316,37 +19705,37 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    +
    +

    Lose of Negotiating Capacity

    TermInformativenessBiasLoseGoodwill Prefix risk
    LabelInformativeness BiasLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:EngineeringDecisionBias + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupConcept representing Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - @@ -15359,7 +19748,7 @@

    In-Group Bias

    - + @@ -15368,19 +19757,22 @@

    In-Group Bias

    - + - + - + + + + - + @@ -15398,23 +19790,23 @@

    In-Group Bias

    -
    -

    Injury

    +
    +

    Lose of Opportunity

    TermInGroupBiasLoseNegotiatingCapacity Prefix risk
    LabelIn-Group BiasLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsConcept representing Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + @@ -15426,8 +19818,9 @@

    Injury

    - @@ -15440,7 +19833,7 @@

    Injury

    - + @@ -15482,38 +19875,36 @@

    Injury

    - -
    -

    None

    +
    +

    Lose of Reputation

    TermInjuryLoseOpportunity Prefix risk
    LabelInjuryLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseOpportunity
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjuryConcept representing Loss of Opportunity
    - + - + - + - + - @@ -15525,19 +19916,34 @@

    None

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15550,35 +19956,41 @@

    None

    -
    -

    Integrity Concept

    + + + + +
    +

    Lose of Trust

    TermIntegrityBreachLoseReputation Prefix risk
    LabelNoneLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionConcept representing Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15591,25 +20003,28 @@

    Integrity Concept

    - + - - - - + - + + + + - + - + + + + @@ -15618,7 +20033,7 @@

    Integrity Concept

    - @@ -15626,42 +20041,51 @@

    Integrity Concept

    -
    -

    Integrity Incident

    + +
    +

    Low Likelihood

    TermIntegrityConceptLoseTrust Prefix risk
    LabelIntegrity ConceptLose of Trust
    IRIhttps://w3id.org/dpv/risk#IntegrityConcepthttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Integrity' in CIA InfoSec modelConcept representing Loss of Trust
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -15672,9 +20096,12 @@

    Integrity Incident

    - + - + + + + @@ -15685,15 +20112,18 @@

    Integrity Incident

    - + - + + + + - @@ -15702,44 +20132,52 @@

    Integrity Incident

    - - - -
    -

    Intentional Misuse

    +
    +

    Low Risk

    TermIntegrityIncidentLowLikelihood Prefix risk
    LabelIntegrity IncidentLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident where the integrity of information or system has been affectedLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15748,9 +20186,12 @@

    Intentional Misuse

    - + - + + + + @@ -15759,14 +20200,20 @@

    Intentional Misuse

    - + + + + - + + + + - @@ -15775,45 +20222,52 @@

    Intentional Misuse

    - - - - -
    -

    Intercept Communications

    +
    +

    Low Severity

    TermIntentionalMisuseLowRisk Prefix risk
    LabelIntentional MisuseLow Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Misuse - → risk:UserRisks - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionIntentional MisuseLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15822,31 +20276,25 @@

    Intercept Communications

    - + - + - - - - + - + - - - - + @@ -15855,7 +20303,7 @@

    Intercept Communications

    - @@ -15867,27 +20315,23 @@

    Intercept Communications

    - - - - -
    -

    Judicial Costs

    +
    +

    Loyalty Program Exclusion

    TermInterceptCommunicationsLowSeverity Prefix risk
    LabelIntercept CommunicationsLow Severity
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Interception of CommunicationsLevel where Severity is Low
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + @@ -15899,8 +20343,8 @@

    Judicial Costs

    - @@ -15914,7 +20358,7 @@

    Judicial Costs

    - + @@ -15925,7 +20369,10 @@

    Judicial Costs

    - + + + + @@ -15944,36 +20391,36 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    +
    +

    Malicious Activity

    TermJudicialCostsLoyaltyProgramExclusion Prefix risk
    LabelJudicial CostsLoyalty Program Exclusion
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoyaltyProgramExclusion
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidStub
    Date Created2024-10-21
    - + - + - + - + - @@ -15987,7 +20434,7 @@

    Judicial Penalty

    - + @@ -16017,40 +20464,39 @@

    Judicial Penalty

    -
    -

    Language Discrimination

    + + +
    +

    Malicious Code Attack

    TermJudicialPenaltyMaliciousActivity Prefix risk
    LabelJudicial PenaltyMalicious Activity
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    - + - + - + - + - - - @@ -16064,23 +20510,32 @@

    Language Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -16096,35 +20551,41 @@

    Language Discrimination

    -
    -

    Legal Risk

    + + + +
    +

    Malware Attack

    TermLanguageDiscriminationMaliciousCodeAttack Prefix risk
    LabelLanguage DiscriminationMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#LanguageDiscriminationhttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's language, often linked to national origin or ethnicityConcept representing Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16137,20 +20598,32 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -16167,23 +20640,23 @@

    Legal Risk

    -
    -

    Lose of Credibility

    +
    +

    Material Damage

    TermLegalRiskMalwareAttack Prefix risk
    LabelLegal RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementConcept representing Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -16195,7 +20668,8 @@

    Lose of Credibility

    - @@ -16209,23 +20683,23 @@

    Lose of Credibility

    - + - + + + + - - - - + - + @@ -16251,35 +20725,37 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    +
    +

    Misandry

    TermLoseCredibilityMaterialDamage Prefix risk
    LabelLose of CredibilityMaterial Damage
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#MaterialDamage
    Broader/Parent types risk:ReputationalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of CredibilityConcept representing Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -16293,32 +20769,23 @@

    Lose of Customer Confidence

    - + - - - - + - + - - - - - - - - + + @@ -16335,35 +20802,37 @@

    Lose of Customer Confidence

    -
    -

    Lose of Goodwill

    +
    +

    Misogyny

    TermLoseCustomerConfidenceMisandry Prefix risk
    LabelLose of Customer ConfidenceMisandry
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Customer ConfidenceDislike, contempt, or prejudice against men
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16377,32 +20846,23 @@

    Lose of Goodwill

    - + - - - - + - + - - - - - - - - + + @@ -16419,35 +20879,36 @@

    Lose of Goodwill

    -
    -

    Lose of Negotiating Capacity

    +
    +

    Misuse

    TermLoseGoodwillMisogyny Prefix risk
    LabelLose of GoodwillMisogyny
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillDislike, contempt, or prejudice against women
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16461,23 +20922,20 @@

    Lose of Negotiating Capacity

    - + - - - - + - + @@ -16485,7 +20943,7 @@

    Lose of Negotiating Capacity

    - + @@ -16500,43 +20958,52 @@

    Lose of Negotiating Capacity

    - - - -
    -

    Lose of Opportunity

    +
    +

    Moderate Likelihood

    TermLoseNegotiatingCapacityMisuse Prefix risk
    LabelLose of Negotiating CapacityMisuse
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ReputationalRisk + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityConcept representing a misuse (of something)
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-06-11
    Date Modified
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    - + - + - + - + - + + + + - + + + + @@ -16545,28 +21012,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -16575,7 +21039,7 @@

    Lose of Opportunity

    - @@ -16584,43 +21048,52 @@

    Lose of Opportunity

    - - - -
    -

    Lose of Reputation

    +
    +

    Moderate Risk

    TermLoseOpportunityModerateLikelihood Prefix risk
    LabelLose of OpportunityModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Loss of OpportunityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16629,28 +21102,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -16659,7 +21129,7 @@

    Lose of Reputation

    - @@ -16668,43 +21138,52 @@

    Lose of Reputation

    - - - -
    -

    Lose of Trust

    +
    +

    Moderate Severity

    TermLoseReputationModerateRisk Prefix risk
    LabelLose of ReputationModerate Risk
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Loss of ReputationLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16713,28 +21192,25 @@

    Lose of Trust

    - + - + + + + - - - - + - + - - - - + @@ -16743,7 +21219,7 @@

    Lose of Trust

    - @@ -16752,50 +21228,46 @@

    Lose of Trust

    -
    -

    Low Likelihood

    +
    +

    Monitor Consequence

    TermLoseTrustModerateSeverity Prefix risk
    LabelLose of TrustModerate Severity
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Loss of TrustLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - @@ -16806,12 +21278,9 @@

    Low Likelihood

    - + - - - - + @@ -16822,7 +21291,7 @@

    Low Likelihood

    - + @@ -16833,7 +21302,7 @@

    Low Likelihood

    - @@ -16842,50 +21311,45 @@

    Low Likelihood

    -
    -

    Low Risk

    +
    +

    Monitor Control

    TermLowLikelihoodMonitorConsequence Prefix risk
    LabelLow LikelihoodMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is LowControl that monitors a Risk Consequence
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16896,11 +21360,11 @@

    Low Risk

    - + - + @@ -16912,7 +21376,7 @@

    Low Risk

    - + @@ -16923,7 +21387,7 @@

    Low Risk

    - @@ -16932,50 +21396,46 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Monitor Impact

    TermLowRiskMonitorControl Prefix risk
    LabelLow RiskMonitor Control
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Risk is LowRisk Mitigation Measure that uses controls to monitor events
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16986,12 +21446,9 @@

    Low Severity

    - + - - - - + @@ -17002,7 +21459,7 @@

    Low Severity

    - + @@ -17013,7 +21470,7 @@

    Low Severity

    - @@ -17022,43 +21479,48 @@

    Low Severity

    - - - -
    -

    Malicious Activity

    +
    +

    Monitor Risk

    TermLowSeverityMonitorImpact Prefix risk
    LabelLow SeverityMonitor Impact
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Severity is LowControl that monitors a Risk Impact
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17067,7 +21529,7 @@

    Malicious Activity

    - + @@ -17078,14 +21540,20 @@

    Malicious Activity

    - + + + + - + + + + - @@ -17094,46 +21562,48 @@

    Malicious Activity

    - - - - - -
    -

    Malicious Code Attack

    +
    +

    Monitor Control

    TermMaliciousActivityMonitorRisk Prefix risk
    LabelMalicious ActivityMonitor Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousActivityhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to othersControl that monitors a Risk
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17142,28 +21612,22 @@

    Malicious Code Attack

    - + - - - - + - + - - - - + @@ -17172,7 +21636,7 @@

    Malicious Code Attack

    - @@ -17181,46 +21645,48 @@

    Malicious Code Attack

    - - - - - -
    -

    Malware Attack

    +
    +

    Monitor Risk Source

    TermMaliciousCodeAttackMonitorRiskControl Prefix risk
    LabelMalicious Code AttackMonitor Control
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors another Control
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17229,28 +21695,22 @@

    Malware Attack

    - + - - - - + - + - - - - + @@ -17259,7 +21719,7 @@

    Malware Attack

    - @@ -17268,43 +21728,48 @@

    Malware Attack

    - - - -
    -

    Material Damage

    +
    +

    Monitor Vulnerabilities

    TermMalwareAttackMonitorRiskSource Prefix risk
    LabelMalware AttackMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk Source
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17313,12 +21778,9 @@

    Material Damage

    - + - - - - + @@ -17329,12 +21791,9 @@

    Material Damage

    - + - - - - + @@ -17343,7 +21802,7 @@

    Material Damage

    - @@ -17355,23 +21814,23 @@

    Material Damage

    -
    -

    Misandry

    +
    +

    Nationality Discrimination

    TermMaterialDamageMonitorVulnerabilities Prefix risk
    LabelMaterial DamageMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that monitors a Risk Vulnerability
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -17383,14 +21842,8 @@

    Misandry

    - - - @@ -17404,7 +21857,7 @@

    Misandry

    - + @@ -17437,42 +21890,36 @@

    Misandry

    -
    -

    Misogyny

    +
    +

    Non-Material Damage

    TermMisandryNationalityDiscrimination Prefix risk
    LabelMisandryNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#Misandryhttps://w3id.org/dpv/risk#NationalityDiscrimination
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against menDiscrimination based on a person's nationality or citizenship
    - + - + - + - + - - - @@ -17486,9 +21933,12 @@

    Misogyny

    - + - + + + + @@ -17499,10 +21949,16 @@

    Misogyny

    - + - - + + + + + + + + @@ -17519,35 +21975,38 @@

    Misogyny

    -
    -

    Misuse

    +
    +

    Non-Normality Bias

    TermMisogynyNonMaterialDamage Prefix risk
    LabelMisogynyNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Misogynyhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against womenConcept representing Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-09-302022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -17561,28 +22020,28 @@

    Misuse

    - + - + + + + - + - - - - + - + @@ -17597,52 +22056,47 @@

    Misuse

    -
    -

    Moderate Likelihood

    + + + +
    +

    Non-Response Bias

    TermMisuseNonNormalityBias Prefix risk
    LabelMisuseNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:UserRisks + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes MisuseBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-06-112024-09-13
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -17651,34 +22105,34 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + - @@ -17687,52 +22141,42 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + +
    +

    Operational Security Risk

    TermModerateLikelihoodNonResponseBias Prefix risk
    LabelModerate LikelihoodNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17741,12 +22185,9 @@

    Moderate Risk

    - + - - - - + @@ -17755,20 +22196,14 @@

    Moderate Risk

    - - - - + - - - - + - @@ -17777,52 +22212,43 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + + +
    +

    Organisational Risk Concept

    TermModerateRiskOperationalSecurityRisk Prefix risk
    LabelModerate RiskOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateRisks and issues that arise during operational processes
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17831,11 +22257,11 @@

    Moderate Severity

    - + - + @@ -17847,18 +22273,15 @@

    Moderate Severity

    - + - - - - + - @@ -17867,48 +22290,45 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    + + + +
    +

    Out-Group Homogeneity Bias

    TermModerateSeverityOrganisationalRiskConcept Prefix risk
    LabelModerate SeverityOrganisational Risk Concept
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#OrganisationalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateRisk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Organisational in this context refers to an organisation which is not human but is managed by humans
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17917,31 +22337,34 @@

    Monitor Consequence

    - + - + + + + - + - + - @@ -17950,47 +22373,45 @@

    Monitor Consequence

    -
    -

    Monitor Control

    + + + +
    +

    Payment

    TermMonitorConsequenceOutGroupHomogeneityBias Prefix risk
    LabelMonitor ConsequenceOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ConsequenceBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17999,12 +22420,9 @@

    Monitor Control

    - + - - - - + @@ -18015,18 +22433,21 @@

    Monitor Control

    - + - + + + + - + - @@ -18035,48 +22456,44 @@

    Monitor Control

    -
    -

    Monitor Impact

    + + + +
    +

    Personalisation Disabled

    TermMonitorControlPayment Prefix risk
    LabelMonitor ControlPayment
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsSomething that acts as or provides payment e.g. to access a service or purchase resources
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18085,7 +22502,7 @@

    Monitor Impact

    - + @@ -18098,18 +22515,15 @@

    Monitor Impact

    - + - - - - + - @@ -18118,48 +22532,44 @@

    Monitor Impact

    -
    -

    Monitor Risk

    + + + +
    +

    Personalisation Enabled

    TermMonitorImpactPersonalisationDisabled Prefix risk
    LabelMonitor ImpactPersonalisation Disabled
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#PersonalisationDisabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18168,7 +22578,7 @@

    Monitor Risk

    - + @@ -18181,18 +22591,15 @@

    Monitor Risk

    - + - - - - + - @@ -18201,48 +22608,44 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Personal Safety Endangerment

    TermMonitorRiskPersonalisationEnabled Prefix risk
    LabelMonitor RiskPersonalisation Enabled
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#PersonalisationEnabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18251,22 +22654,28 @@

    Monitor Control

    - + - + + + + - + - + + + + @@ -18275,7 +22684,7 @@

    Monitor Control

    - @@ -18284,48 +22693,46 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + + +
    +

    Phishing Scam

    TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
    LabelMonitor ControlPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlConcept representing Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18334,22 +22741,28 @@

    Monitor Risk Source

    - + - + + + + - + - + + + + @@ -18358,7 +22771,7 @@

    Monitor Risk Source

    - @@ -18367,48 +22780,45 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Physical Assault

    TermMonitorRiskSourcePhishingScam Prefix risk
    LabelMonitor Risk SourcePhishing Scam
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceConcept representing Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18417,22 +22827,28 @@

    Monitor Vulnerabilities

    - + - + + + + - + - + + + + @@ -18441,7 +22857,7 @@

    Monitor Vulnerabilities

    - @@ -18453,40 +22869,37 @@

    Monitor Vulnerabilities

    -
    -

    Nationality Discrimination

    +
    +

    Physical Harm

    TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
    LabelMonitor VulnerabilitiesPhysical Assault
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityConcept representing Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -18498,10 +22911,7 @@

    Nationality Discrimination

    - - - - + @@ -18511,10 +22921,7 @@

    Nationality Discrimination

    - - - - + @@ -18532,36 +22939,35 @@

    Nationality Discrimination

    - -
    -

    Non-Material Damage

    +
    +

    Policy Risk

    TermNationalityDiscriminationPhysicalHarm Prefix risk
    LabelNationality DiscriminationPhysical Harm
    IRIhttps://w3id.org/dpv/risk#NationalityDiscriminationhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's nationality or citizenship
    Date Created2024-09-30
    - + - + - + - + - @@ -18575,12 +22981,9 @@

    Non-Material Damage

    - + - - - - + @@ -18589,18 +22992,9 @@

    Non-Material Damage

    - - - - - - - - - - - - + + + @@ -18613,42 +23007,35 @@

    Non-Material Damage

    - - - - -
    -

    Non-Normality Bias

    +
    +

    Potential Consequence

    TermNonMaterialDamagePolicyRisk Prefix risk
    LabelNon-Material DamagePolicy Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PolicyRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:LegalRisk + risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageRisks and consequences regarding policy and its associated processes
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -18661,34 +23048,34 @@

    Non-Normality Bias

    - + - + + + + - - - - + - + - + - @@ -18696,43 +23083,35 @@

    Non-Normality Bias

    - - - - -
    -

    Non-Response Bias

    +
    +

    Potential Impact

    TermNonNormalityBiasPotentialConsequence Prefix risk
    LabelNon-Normality BiasPotential Consequence
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18745,34 +23124,34 @@

    Non-Response Bias

    - + - + + + + - - - - + - + - + - @@ -18780,33 +23159,30 @@

    Non-Response Bias

    - - - -
    -

    Operational Security Risk

    +
    +

    Potential Risk

    TermNonResponseBiasPotentialImpact Prefix risk
    LabelNon-Response BiasPotential Impact
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + @@ -18824,9 +23200,12 @@

    Operational Security Risk

    - + - + + + + @@ -18835,14 +23214,20 @@

    Operational Security Risk

    - + + + + - + + + + - @@ -18850,41 +23235,35 @@

    Operational Security Risk

    - - - - -
    -

    Out-Group Homogeneity Bias

    +
    +

    Potential RiskSource

    TermOperationalSecurityRiskPotentialRisk Prefix risk
    LabelOperational Security RiskPotential Risk
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    DefinitionRisks and issues that arise during operational processesIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18897,34 +23276,34 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - + - + - @@ -18936,23 +23315,23 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    +
    +

    Privacy

    TermOutGroupHomogeneityBiasPotentialRiskSource Prefix risk
    LabelOut-Group Homogeneity BiasPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + @@ -18964,8 +23343,8 @@

    Payment

    - @@ -18977,10 +23356,7 @@

    Payment

    - - - - + @@ -18990,18 +23366,9 @@

    Payment

    - - - - - - - - - - - - + + + @@ -19018,23 +23385,23 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Psychological Harm

    TermPaymentPrivacy Prefix risk
    LabelPaymentPrivacy
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#Privacy
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + @@ -19046,7 +23413,9 @@

    Personal Safety Endangerment

    - @@ -19060,7 +23429,7 @@

    Personal Safety Endangerment

    - + @@ -19069,7 +23438,7 @@

    Personal Safety Endangerment

    - + @@ -19101,38 +23470,36 @@

    Personal Safety Endangerment

    - - -
    -

    Phishing Scam

    +
    +

    Public Order Breach

    TermPersonalSafetyEndangermentPsychologicalHarm Prefix risk
    LabelPersonal Safety EndangermentPsychological Harm
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PsychologicalHarm
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Personal Safety EndangermentConcept representing Psychological Harm
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - @@ -19146,7 +23513,7 @@

    Phishing Scam

    - + @@ -19155,7 +23522,7 @@

    Phishing Scam

    - + @@ -19188,23 +23555,23 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Public Services Exclusion

    TermPhishingScamPublicOrderBreach Prefix risk
    LabelPhishing ScamPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamConcept representing Public Order Breach
    SourceENISA Threat Landscape for Ransomware Attacks 2022ISO/IEC 27005:2018
    - + - + - + @@ -19216,8 +23583,9 @@

    Physical Assault

    - @@ -19230,32 +23598,23 @@

    Physical Assault

    - + - - - - + - + - - - - - - - - + + @@ -19272,36 +23631,38 @@

    Physical Assault

    -
    -

    Physical Harm

    +
    +

    Racial Discrimination

    TermPhysicalAssaultPublicServicesExclusion Prefix risk
    LabelPhysical AssaultPublic Services Exclusion
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#PublicServicesExclusion
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -19312,7 +23673,10 @@

    Physical Harm

    - + + + + @@ -19322,7 +23686,10 @@

    Physical Harm

    - + + + + @@ -19337,35 +23704,41 @@

    Physical Harm

    -
    -

    Potential Consequence

    + + + + +
    +

    Racism

    TermPhysicalHarmRacialDiscrimination Prefix risk
    LabelPhysical HarmRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionDiscrimination against individuals because of their racial background or skin color
    Date Created2024-09-30
    - + - + - + - + - @@ -19378,12 +23751,9 @@

    Potential Consequence

    - + - - - - + @@ -19394,18 +23764,15 @@

    Potential Consequence

    - + - - - - + - @@ -19413,39 +23780,48 @@

    Potential Consequence

    -
    -

    Potential Impact

    + +
    +

    Recovery Control

    TermPotentialConsequenceRacism Prefix risk
    LabelPotential ConsequenceRacism
    IRIhttps://w3id.org/dpv/risk#PotentialConsequencehttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept can potentially be a 'consequence concept within an use-casePrejudice or discrimination against people based on their race
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -19454,12 +23830,9 @@

    Potential Impact

    - + - - - - + @@ -19470,18 +23843,15 @@

    Potential Impact

    - + - - - - + - @@ -19489,39 +23859,49 @@

    Potential Impact

    -
    -

    Potential Risk

    + +
    +

    Reduce Likelihood

    TermPotentialImpactRecoveryControl Prefix risk
    LabelPotential ImpactRecovery Control
    IRIhttps://w3id.org/dpv/risk#PotentialImpacthttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'impact' concept within an use-caseControl to recover from event
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19530,12 +23910,9 @@

    Potential Risk

    - + - - - - + @@ -19546,7 +23923,7 @@

    Potential Risk

    - + @@ -19557,7 +23934,7 @@

    Potential Risk

    - @@ -19565,39 +23942,49 @@

    Potential Risk

    -
    -

    Potential RiskSource

    + +
    +

    Reduce Severity

    TermPotentialRiskReduceLikelihood Prefix risk
    LabelPotential RiskReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#PotentialRiskhttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk' concept within an use-caseControl that reduces the likelihood of an event
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19606,12 +23993,9 @@

    Potential RiskSource

    - + - - - - + @@ -19622,7 +24006,7 @@

    Potential RiskSource

    - + @@ -19633,7 +24017,7 @@

    Potential RiskSource

    - @@ -19642,49 +24026,57 @@

    Potential RiskSource

    - - - -
    -

    Privacy

    +
    +

    Reduction Control

    TermPotentialRiskSourceReduceSeverity Prefix risk
    LabelPotential RiskSourceReduce Severity
    IRIhttps://w3id.org/dpv/risk#PotentialRiskSourcehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk source' concept within an use-caseControl that reduces the severity of an event
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -19694,14 +24086,17 @@

    Privacy

    - + + + + - @@ -19713,36 +24108,40 @@

    Privacy

    -
    -

    Psychological Harm

    + + + +
    +

    Re-identification

    TermPrivacyReductionControl Prefix risk
    LabelPrivacyReduction Control
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that reduces the likelihood or severity of an event
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -19755,23 +24154,23 @@

    Psychological Harm

    - + - + + + + - - - - + - + @@ -19796,35 +24195,37 @@

    Psychological Harm

    -
    -

    Public Order Breach

    + +
    +

    Religious Discrimination

    TermPsychologicalHarmReidentification Prefix risk
    LabelPsychological HarmRe-identification
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Psychological HarmConcept representing Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-19
    Date Modified
    - + - + - + - + - @@ -19838,32 +24239,23 @@

    Public Order Breach

    - + - - - - + - + - - - - - - - - + + @@ -19877,50 +24269,47 @@

    Public Order Breach

    - - - -
    -

    Racial Discrimination

    +
    +

    Remedy Control

    TermPublicOrderBreachReligiousDiscrimination Prefix risk
    LabelPublic Order BreachReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Public Order BreachDiscrimination based on a person's religious beliefs or practices
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -19929,7 +24318,7 @@

    Racial Discrimination

    - + @@ -19942,7 +24331,7 @@

    Racial Discrimination

    - + @@ -19950,7 +24339,7 @@

    Racial Discrimination

    - @@ -19959,48 +24348,48 @@

    Racial Discrimination

    - - - -
    -

    Racism

    +
    +

    Remove Consequence

    TermRacialDiscriminationRemedyControl Prefix risk
    LabelRacial DiscriminationRemedy Control
    IRIhttps://w3id.org/dpv/risk#RacialDiscriminationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals because of their racial background or skin colorControl to remedy consequences of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - + + + + @@ -20009,7 +24398,7 @@

    Racism

    - + @@ -20022,15 +24411,18 @@

    Racism

    - + - + + + + - @@ -20039,23 +24431,23 @@

    Racism

    -
    -

    Recovery Control

    +
    +

    Remove Impact

    TermRacismRemoveConsequence Prefix risk
    LabelRacismRemove Consequence
    IRIhttps://w3id.org/dpv/risk#Racismhttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionPrejudice or discrimination against people based on their raceControl that removes Consequence i.e. prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -20067,7 +24459,8 @@

    Recovery Control

    - @@ -20077,7 +24470,7 @@

    Recovery Control

    @@ -20088,7 +24481,7 @@

    Recovery Control

    - + @@ -20104,7 +24497,10 @@

    Recovery Control

    - + + + + @@ -20118,23 +24514,23 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Remove Source

    TermRecoveryControlRemoveImpact Prefix risk
    LabelRecovery ControlRemove Impact
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:RiskControl + risk:ImpactControl + → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl to recover from eventControl that removes Impact i.e. prevents it from materialising
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -20146,7 +24542,7 @@

    Reduce Likelihood

    - @@ -20168,7 +24564,7 @@

    Reduce Likelihood

    - + @@ -20201,48 +24597,44 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    + + + +
    +

    Remuneration

    TermReduceLikelihoodRemoveSource Prefix risk
    LabelReduce LikelihoodRemove Source
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:ReductionControl + risk:SourceControl → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure @@ -20157,7 +24553,7 @@

    Reduce Likelihood

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl that reduces the likelihood of an eventControl that removes the risk source
    - + - + - + - + - - - - - + @@ -20251,7 +24643,7 @@

    Reduce Severity

    - + @@ -20264,18 +24656,21 @@

    Reduce Severity

    - + - + + + + - + - @@ -20284,47 +24679,43 @@

    Reduce Severity

    -
    -

    Reduction Control

    + + + +
    +

    Reputational Risk

    TermReduceSeverityRenumeration Prefix risk
    LabelReduce SeverityRemuneration
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20333,7 +24724,7 @@

    Reduction Control

    - + @@ -20344,17 +24735,14 @@

    Reduction Control

    - - - - + - @@ -20366,38 +24754,37 @@

    Reduction Control

    - - - -
    -

    Re-identification

    +
    +

    Requirements Bias

    TermReductionControlReputationalRisk Prefix risk
    LabelReduction ControlReputational Risk
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -20411,31 +24798,31 @@

    Re-identification

    - + - + - + + + + - + - - - - + - + @@ -20453,23 +24840,23 @@

    Re-identification

    -
    -

    Religious Discrimination

    +
    +

    Reverse Discrimination

    TermReidentificationRequirementsBias Prefix risk
    LabelRe-identificationRequirements Bias
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Re-identificationBias that occurs in or during requirements creation
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentificationRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2022-08-192024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + @@ -20482,11 +24869,7 @@

    Religious Discrimination

    - - @@ -20500,7 +24883,7 @@

    Religious Discrimination

    - + @@ -20530,47 +24913,45 @@

    Religious Discrimination

    -
    -

    Remedy Control

    + + + +
    +

    Reward

    TermReligiousDiscriminationReverseDiscrimination Prefix risk
    LabelReligious DiscriminationReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#ReligiousDiscriminationhttps://w3id.org/dpv/risk#ReverseDiscrimination
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's religious beliefs or practicesDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    - + - + - + - + - - - - - + @@ -20579,7 +24960,7 @@

    Remedy Control

    - + @@ -20592,15 +24973,21 @@

    Remedy Control

    - + - - + + + + + + + + - @@ -20609,48 +24996,44 @@

    Remedy Control

    -
    -

    Remove Consequence

    + + + +
    +

    Rights Denied

    TermRemedyControlReward Prefix risk
    LabelRemedy ControlReward
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to remedy consequences of eventSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20659,31 +25042,104 @@

    Remove Consequence

    - + + + + + + + + + + + + + + + + + + + + +
    TermRemoveConsequenceRightsDenied Prefix risk
    LabelRemove ConsequenceRights Denied
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RightsDenied
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Rights Eroded

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - + + - - - - + + + + + + + + + + + + + + - @@ -20692,48 +25148,44 @@

    Remove Consequence

    -
    -

    Remove Impact

    + + + +
    +

    Rights Exercise Prevented

    TermRightsErodedPrefixrisk
    LabelRights Eroded
    IRIhttps://w3id.org/dpv/risk#RightsEroded
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    Date Created2024-05-19DefinitionThe gradual weakening or reduction of the scope and protection of rights
    ContributorsHarshvardhan J. Pandit
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20742,9 +25194,12 @@

    Remove Impact

    - + - + + + + @@ -20755,18 +25210,21 @@

    Remove Impact

    - + - + + + + - + - @@ -20775,48 +25233,43 @@

    Remove Impact

    -
    -

    Remove Source

    + + + +
    +

    Rights Impact

    TermRemoveImpactRightsExercisePrevented Prefix risk
    LabelRemove ImpactRights Exercise Prevented
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevented
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-192022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20825,22 +25278,31 @@

    Remove Source

    - + - + + + + - + + + + - + - + + + + @@ -20849,7 +25311,7 @@

    Remove Source

    - @@ -20861,23 +25323,23 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Rights Limited

    TermRemoveSourceRightsImpact Prefix risk
    LabelRemove SourceRights Impact
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceConcept representing Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -20889,7 +25351,8 @@

    Remuneration

    - @@ -20903,9 +25366,12 @@

    Remuneration

    - + - + + + + @@ -20916,7 +25382,7 @@

    Remuneration

    - + @@ -20942,23 +25408,23 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Rights Obstructed

    TermRenumerationRightsLimited Prefix risk
    LabelRemunerationRights Limited
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimited
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    - + - + - + @@ -20970,7 +25436,9 @@

    Reputational Risk

    - @@ -20983,9 +25451,12 @@

    Reputational Risk

    - + - + + + + @@ -21013,37 +25484,37 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    Rights Unfulfilled

    TermReputationalRiskRightsObstructed Prefix risk
    LabelReputational RiskRights Obstructed
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsObstructed
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that affect the reputation of the organisationInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    - + - + - + - + - @@ -21056,32 +25527,23 @@

    Requirements Bias

    - + - + - - - - + - - - - + - - - - + @@ -21098,40 +25560,36 @@

    Requirements Bias

    -
    -

    Reverse Discrimination

    +
    +

    Rights Violated

    TermRequirementsBiasRightsUnfulfilled Prefix risk
    LabelRequirements BiasRights Unfulfilled
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs in or during requirements creationFailure to meet or complete the fulfilment of rights
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifestHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -21145,9 +25603,12 @@

    Reverse Discrimination

    - + - + + + + @@ -21158,10 +25619,16 @@

    Reverse Discrimination

    - + - - + + + + + + + + @@ -21172,43 +25639,42 @@

    Reverse Discrimination

    TermReverseDiscriminationRightsViolated Prefix risk
    LabelReverse DiscriminationRights Violated
    IRIhttps://w3id.org/dpv/risk#ReverseDiscriminationhttps://w3id.org/dpv/risk#RightsViolated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equalityThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-09-302022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    + + + + - - - - -
    -

    Reward

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -21221,34 +25687,34 @@

    Reward

    - + - + + + + - + - - - - + - + - @@ -21256,41 +25722,35 @@

    Reward

    - - - - -
    -

    Erosion of Rights

    +
    +

    Risk Assessment

    TermRewardRiskAnalysis Prefix risk
    LabelRewardRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2024-04-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21303,28 +25763,31 @@

    Erosion of Rights

    - + - - - - + - + + + + - + + + + - @@ -21332,45 +25795,46 @@

    Erosion of Rights

    - - - - -
    -

    Obstruction of Rights

    +
    +

    Risk Control

    TermRightErodedRiskAssessment Prefix risk
    LabelErosion of RightsRisk Assessment
    IRIhttps://w3id.org/dpv/risk#RightErodedhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
    DefinitionThe gradual weakening or reduction of the scope and protection of rightsAssessment of risk involving its identification, analysis, and evaluation
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-02-14
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -21379,13 +25843,13 @@

    Obstruction of Rights

    - + - - - - + + + + @@ -21393,14 +25857,17 @@

    Obstruction of Rights

    - + + + + - @@ -21408,42 +25875,33 @@

    Obstruction of Rights

    - - - - -
    -

    Denial of Rights

    +
    +

    Risk Management

    TermRightObstructedRiskControl Prefix risk
    LabelObstruction of RightsRisk Control
    IRIhttps://w3id.org/dpv/risk#RightObstructedhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionInterference with or blocking of the exercise of rightsControl that modifies risk
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + @@ -21455,28 +25913,31 @@

    Denial of Rights

    - + - - - - + - + + + + - + + + + - @@ -21485,40 +25946,36 @@

    Denial of Rights

    - - - -
    -

    Prevent Exercising of Rights

    +
    +

    Risk Matrix

    TermRightsDenialRiskManagement Prefix risk
    LabelDenial of RightsRisk Management
    IRIhttps://w3id.org/dpv/risk#RightsDenialhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept -
    DefinitionThe refusal or withholding or denial of the existence or applicability of rightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-06-12
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21531,37 +25988,34 @@

    Prevent Exercising of Rights

    - + - - - - + - + + + + - + - - - - + - + - @@ -21570,39 +26024,37 @@

    Prevent Exercising of Rights

    - - - -
    -

    Impact to Rights

    +
    +

    Risk Matrix 3x3

    TermRightsExercisePreventionRiskMatrix Prefix risk
    LabelPrevent Exercising of RightsRisk Matrix
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionActions or measures that prevent an individual or group from exercising their legal rights.Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceIEC 31010:2019
    Date Created2022-08-182024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21615,20 +26067,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -21636,10 +26082,7 @@

    Impact to Rights

    - - - - + @@ -21648,7 +26091,7 @@

    Impact to Rights

    - @@ -21657,40 +26100,37 @@

    Impact to Rights

    - - - -
    -

    Limitation of Rights

    +
    +

    Risk Matrix 5x5

    TermRightsImpactRiskMatrix3x3 Prefix risk
    LabelImpact to RightsRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Impact to RightsA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21703,12 +26143,9 @@

    Limitation of Rights

    - + - - - - + @@ -21719,21 +26156,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -21742,40 +26176,37 @@

    Limitation of Rights

    - - - -
    -

    Unfulfilment of Rights

    +
    +

    Risk Matrix 7x7

    TermRightsLimitationRiskMatrix5x5 Prefix risk
    LabelLimitation of RightsRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionA limitation or restrictions on the scope or exercise of rightsA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21788,12 +26219,9 @@

    Unfulfilment of Rights

    - + - - - - + @@ -21802,14 +26230,20 @@

    Unfulfilment of Rights

    - + + + + - + + + + - @@ -21817,45 +26251,43 @@

    Unfulfilment of Rights

    - - - - -
    -

    Violation of Rights

    +
    +

    Risk Source

    TermRightsUnfulfilledRiskMatrix7x7 Prefix risk
    LabelUnfulfilment of RightsRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RightsUnfulfilledhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionFailure to meet or complete the fulfilment of rightsA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - + + + + @@ -21864,12 +26296,9 @@

    Violation of Rights

    - + - - - - + @@ -21880,61 +26309,57 @@

    Violation of Rights

    - + - - - - + -
    TermRightsViolationRiskSource Prefix risk
    LabelViolation of RightsRisk Source
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rightsThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182024-02-14
    Date Modified 2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + - + - + - @@ -21948,23 +26373,20 @@

    Risk Analysis

    - + - - - - + - + @@ -21975,7 +26397,7 @@

    Risk Analysis

    - @@ -21983,35 +26405,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRiskAnalysisRM3x3S1L1 Prefix risk
    LabelRisk AnalysisLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22024,31 +26450,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -22056,46 +26482,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRiskAssessmentRM3x3S1L2 Prefix risk
    LabelRisk AssessmentLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -22104,13 +26527,10 @@

    Risk Control

    - + - - - @@ -22120,15 +26540,18 @@

    Risk Control

    - + - + + + + - @@ -22136,33 +26559,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRiskControlRM3x3S1L3 Prefix risk
    LabelRisk ControlModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -22174,31 +26604,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -22207,35 +26637,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRiskManagementRM3x3S2L1 Prefix risk
    LabelRisk ManagementLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22249,23 +26681,20 @@

    Risk Matrix

    - + - - - - + - + @@ -22276,7 +26705,7 @@

    Risk Matrix

    - @@ -22285,23 +26714,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRiskMatrixRM3x3S2L2 Prefix risk
    LabelRisk MatrixModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22313,7 +26742,8 @@

    Risk Matrix 3x3

    - @@ -22328,7 +26758,7 @@

    Risk Matrix 3x3

    - + @@ -22361,23 +26791,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRiskMatrix3x3RM3x3S2L3 Prefix risk
    LabelRisk Matrix 3x3High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22389,7 +26819,8 @@

    Risk Matrix 5x5

    - @@ -22404,7 +26835,7 @@

    Risk Matrix 5x5

    - + @@ -22437,23 +26868,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRiskMatrix5x5RM3x3S3L1 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22465,7 +26896,8 @@

    Risk Matrix 7x7

    - @@ -22480,7 +26912,7 @@

    Risk Matrix 7x7

    - + @@ -22512,43 +26944,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRiskMatrix7x7RM3x3S3L2 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + - + - - - - - + @@ -22557,7 +26989,7 @@

    Risk Source

    - + @@ -22570,18 +27002,18 @@

    Risk Source

    - + + - - - - + + + - @@ -22590,23 +27022,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRiskSourceRM3x3S3L3 Prefix risk
    LabelRisk SourceHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22618,7 +27050,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -22667,23 +27099,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM3x3S1L1RM5x5S1L1 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S1L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22634,7 +27066,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22695,7 +27127,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -22744,23 +27176,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM3x3S1L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S1L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22711,7 +27143,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22772,7 +27204,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -22821,23 +27253,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM3x3S1L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S1L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22788,7 +27220,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22849,7 +27281,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -22898,23 +27330,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM3x3S2L1RM5x5S1L4 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S1L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22865,7 +27297,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22926,7 +27358,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -22975,23 +27407,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM3x3S2L2RM5x5S1L5 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22942,7 +27374,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -23003,7 +27435,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -23052,23 +27484,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM3x3S2L3RM5x5S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S2L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23019,7 +27451,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23080,7 +27512,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -23129,23 +27561,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM3x3S3L1RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S2L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23096,7 +27528,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -23157,7 +27589,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -23206,23 +27638,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM3x3S3L2RM5x5S2L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23173,7 +27605,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23234,7 +27666,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -23283,23 +27715,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM3x3S3L3RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23250,7 +27682,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -23327,7 +27759,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -23360,23 +27792,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S1L1RM5x5S2L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -23404,7 +27836,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -23437,23 +27869,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S1L2RM5x5S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23481,7 +27913,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -23514,23 +27946,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S1L3RM5x5S3L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23558,7 +27990,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -23591,23 +28023,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S1L4RM5x5S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23635,7 +28067,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -23668,23 +28100,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S1L5RM5x5S3L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23712,7 +28144,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -23745,23 +28177,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S2L1RM5x5S3L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23789,7 +28221,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -23822,23 +28254,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S2L2RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23866,7 +28298,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -23899,23 +28331,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S2L3RM5x5S4L2 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23943,7 +28375,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -23976,23 +28408,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S2L4RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24020,7 +28452,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -24053,23 +28485,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S2L5RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24097,7 +28529,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -24130,23 +28562,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S3L1RM5x5S4L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24174,7 +28606,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -24207,23 +28639,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S3L2RM5x5S5L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -24251,7 +28683,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -24284,23 +28716,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S3L3RM5x5S5L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -24328,7 +28760,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -24361,23 +28793,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S3L4RM5x5S5L3 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24405,7 +28837,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -24438,23 +28870,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S3L5RM5x5S5L4 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24482,7 +28914,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -24515,23 +28947,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S4L1RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24543,7 +28975,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -24592,23 +29024,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S4L2RM7x7S1L1 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24559,7 +28991,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24620,7 +29052,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -24669,23 +29101,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S4L3RM7x7S1L2 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24636,7 +29068,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24697,7 +29129,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -24746,23 +29178,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S4L4RM7x7S1L3 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24713,7 +29145,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24774,7 +29206,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -24823,23 +29255,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S4L5RM7x7S1L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24790,7 +29222,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24851,7 +29283,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermRM5x5S5L1RM7x7S1L5 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24867,7 +29299,84 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK +
    +
    + + + +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -24900,23 +29409,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S1L6Prefixrisk
    LabelVery Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6
    Typerdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24928,7 +29437,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -24977,23 +29486,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S5L2RM7x7S1L7 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24944,7 +29453,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -25005,7 +29514,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -25054,23 +29563,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S5L3RM7x7S2L1 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25021,7 +29530,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25082,7 +29591,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -25131,23 +29640,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S5L4RM7x7S2L2 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25098,7 +29607,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -25159,7 +29668,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -25208,23 +29717,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S5L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25175,7 +29684,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -25252,7 +29761,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -25285,23 +29794,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S1L1RM7x7S2L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -25329,7 +29838,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -25362,23 +29871,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S1L2RM7x7S2L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -25406,7 +29915,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -25439,23 +29948,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S1L3RM7x7S2L6 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -25483,7 +29992,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -25516,23 +30025,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S1L4RM7x7S2L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25560,7 +30069,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -25593,23 +30102,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S1L5RM7x7S3L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25637,7 +30146,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -25670,23 +30179,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S1L6RM7x7S3L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25714,7 +30223,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -25747,23 +30256,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S1L7RM7x7S3L3 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25791,7 +30300,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -25824,23 +30333,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S2L1RM7x7S3L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25868,7 +30377,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -25901,23 +30410,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S2L2RM7x7S3L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25945,7 +30454,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -25978,23 +30487,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S2L3RM7x7S3L6 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -26022,7 +30531,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -26055,23 +30564,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S2L4RM7x7S3L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26099,7 +30608,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -26132,23 +30641,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S2L5RM7x7S4L1 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -26176,7 +30685,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -26209,23 +30718,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S2L6RM7x7S4L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26253,7 +30762,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -26286,23 +30795,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S2L7RM7x7S4L3 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26330,7 +30839,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -26363,23 +30872,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S3L1RM7x7S4L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26407,7 +30916,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -26440,23 +30949,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S3L2RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -26484,7 +30993,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -26517,23 +31026,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S3L3RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26561,7 +31070,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -26594,23 +31103,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S3L4RM7x7S4L7 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26638,7 +31147,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -26671,23 +31180,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S3L5RM7x7S5L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26715,7 +31224,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -26748,23 +31257,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S3L6RM7x7S5L2 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26792,7 +31301,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -26825,23 +31334,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S3L7RM7x7S5L3 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26869,7 +31378,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -26902,23 +31411,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S4L1RM7x7S5L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26946,7 +31455,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -26979,23 +31488,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S4L2RM7x7S5L5 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27023,7 +31532,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -27056,23 +31565,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S4L3RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27100,7 +31609,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -27133,23 +31642,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S4L4RM7x7S5L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27177,7 +31686,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -27210,23 +31719,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S4L5RM7x7S6L1 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -27254,7 +31763,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -27287,23 +31796,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S4L6RM7x7S6L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27331,7 +31840,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -27364,23 +31873,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S4L7RM7x7S6L3 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27408,7 +31917,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -27441,23 +31950,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S5L1RM7x7S6L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -27485,7 +31994,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -27518,23 +32027,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S5L2RM7x7S6L5 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27562,7 +32071,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -27595,23 +32104,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S5L3RM7x7S6L6 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27639,7 +32148,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -27672,23 +32181,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S5L4RM7x7S6L7 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27716,7 +32225,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -27749,23 +32258,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S5L5RM7x7S7L1 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27793,7 +32302,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -27826,23 +32335,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S5L6RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27870,7 +32379,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -27903,23 +32412,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S5L7RM7x7S7L3 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27947,7 +32456,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -27980,23 +32489,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S6L1RM7x7S7L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -28024,7 +32533,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -28057,23 +32566,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S6L2RM7x7S7L5 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -28101,7 +32610,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -28134,23 +32643,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S6L3RM7x7S7L6 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -28178,7 +32687,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -28211,38 +32720,41 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S6L4RM7x7S7L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -28255,31 +32767,37 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - + + + + - + + + + - + - + - @@ -28288,38 +32806,43 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + + + +
    +

    Sabotage

    TermRM7x7S6L5RuleBasedSystemDesign Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28332,14 +32855,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -28347,7 +32873,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -28356,7 +32885,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -28365,38 +32894,43 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    + + + +
    +

    Sampling Bias

    TermRM7x7S6L6Sabotage Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighConcept representing Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28409,31 +32943,34 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + - + + + + - + - + - @@ -28442,38 +32979,42 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + + +
    +

    Scam

    TermRM7x7S6L7SamplingBias Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28486,14 +33027,17 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + @@ -28501,7 +33045,10 @@

    Low Risk (RM7x7 S:7 L:1)

    - + + + + @@ -28510,7 +33057,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - @@ -28519,38 +33066,42 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + + + +
    +

    Security Attack

    TermRM7x7S7L1Scam Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowConcept representing Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28563,7 +33114,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -28574,20 +33125,14 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - - - - + - - - - + - @@ -28596,38 +33141,43 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S7L2SecurityAttack Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateConcept representing an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28640,14 +33190,17 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + @@ -28655,7 +33208,10 @@

    High Risk (RM7x7 S:7 L:3)

    - + + + + @@ -28664,7 +33220,7 @@

    High Risk (RM7x7 S:7 L:3)

    - @@ -28673,38 +33229,42 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Selection Bias

    TermRM7x7S7L3SecurityBreach Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighConcept representing Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28717,31 +33277,34 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + - + + + + - + - + - @@ -28750,38 +33313,45 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + + + + + + +
    +

    Service Alternative Offered

    TermRM7x7S7L4SelectionBias Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28794,7 +33364,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -28807,18 +33377,15 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - - - - + - @@ -28827,38 +33394,40 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    + + + +
    +

    Service Cost Increased

    TermRM7x7S7L5ServiceAlternativeOffered Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Service Alternative Offered
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#ServiceAlternativeOffered
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28871,7 +33440,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -28884,18 +33453,15 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - - - - + - @@ -28904,38 +33470,40 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + +
    +

    Service Denied

    TermRM7x7S7L6ServiceCostIncreased Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Service Cost Increased
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#ServiceCostIncreased
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28948,7 +33516,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -28961,18 +33529,15 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - - - - + - @@ -28984,37 +33549,37 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    +
    +

    Service Limited

    TermRM7x7S7L7ServiceDenied Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Service Denied
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#ServiceDenied
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -29027,32 +33592,23 @@

    Rule-Based System Design

    - + - - - - + - - - - + - + - - - - + @@ -29069,38 +33625,36 @@

    Rule-Based System Design

    - - -
    -

    Sabotage

    +
    +

    Service Not Provided

    TermRuleBasedSystemDesignServiceLimited Prefix risk
    LabelRule-Based System DesignService Limited
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#ServiceLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designStub
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29114,32 +33668,23 @@

    Sabotage

    - + - - - - + - + - - - - - - - - + + @@ -29156,39 +33701,37 @@

    Sabotage

    -
    -

    Sampling Bias

    +
    +

    Service Partially Provided

    TermSabotageServiceNotProvided Prefix risk
    LabelSabotageService Not Provided
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#ServiceNotProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SabotageStub
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29201,29 +33744,23 @@

    Sampling Bias

    - + - - - - + - + - - - - + @@ -29240,37 +33777,36 @@

    Sampling Bias

    - -
    -

    Scam

    +
    +

    Service Provided

    TermSamplingBiasServicePartiallyProvided Prefix risk
    LabelSampling BiasService Partially Provided
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#ServicePartiallyProvided
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29284,32 +33820,23 @@

    Scam

    - + - - - - + - + - - - - - - - - + + @@ -29326,37 +33853,36 @@

    Scam

    - - -
    -

    Security Attack

    +
    +

    Service Provision Delayed

    TermScamServiceProvided Prefix risk
    LabelScamService Provided
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#ServiceProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ScamStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29370,7 +33896,7 @@

    Security Attack

    - + @@ -29381,7 +33907,10 @@

    Security Attack

    - + + + + @@ -29400,38 +33929,111 @@

    Security Attack

    +
    +

    Service Quality Reduced

    +
    TermSecurityAttackServiceProvisionDelayed Prefix risk
    LabelSecurity AttackService Provision Delayed
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#ServiceProvisionDelayed
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itStub
    Date Created2024-10-21
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceQualityReducedPrefixrisk
    LabelService Quality Reduced
    IRIhttps://w3id.org/dpv/risk#ServiceQualityReduced
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    -
    -

    Security Breach

    + + + + +
    +

    None

    - + - + - + - + - @@ -29445,32 +34047,23 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + @@ -29487,38 +34080,37 @@

    Security Breach

    -
    -

    Selection Bias

    +
    +

    Service Security Reduced

    TermSecurityBreachServiceRelatedConsequence Prefix risk
    LabelSecurity BreachNone
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ServiceRelatedConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Security BreachA consequence related to the provision of a service
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29531,29 +34123,23 @@

    Selection Bias

    - + - - - - + - + - - - - + @@ -29570,6 +34156,77 @@

    Selection Bias

    +
    +

    Service Termination

    +
    TermSelectionBiasServiceSecurityReduced Prefix risk
    LabelSelection BiasService Security Reduced
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ServiceSecurityReduced
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceTerminationPrefixrisk
    LabelService Termination
    IRIhttps://w3id.org/dpv/risk#ServiceTermination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + @@ -29605,12 +34262,7 @@

    Sex Discrimination

    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29686,11 +34338,7 @@

    Sexism

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29767,6 +34415,8 @@

    Sexual Harassment

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29835,11 +34485,7 @@

    SexualOrientation Discrimination

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29916,6 +34562,8 @@

    Sexual Violence

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29928,7 +34576,7 @@

    Sexual Violence

    Definition - Something that acts as or causes Sexual Violence + Concept representing Sexual Violence @@ -30005,7 +34653,7 @@

    Share Risk

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl @@ -30082,7 +34730,8 @@

    Simpson'S Paradox Bias

    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30162,7 +34811,8 @@

    Social Disadvantage

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30176,7 +34826,7 @@

    Social Disadvantage

    Definition - Something that acts as or causes Social Disadvantage + Concept representing Social Disadvantage @@ -30245,7 +34895,8 @@

    Societal Bias

    Broader/Parent types risk:CognitiveBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30325,7 +34976,8 @@

    Societal Health & Safety

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30366,30 +35018,31 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + +
    +

    Societal Risk Concept

    - + - + - + - + @@ -30407,9 +35060,12 @@

    Societal Risk

    - + - + + + + @@ -30418,7 +35074,10 @@

    Societal Risk

    - + + + + @@ -30472,7 +35131,7 @@

    Source Control

    @@ -30551,6 +35210,7 @@

    Spoofing

    @@ -30564,7 +35224,7 @@

    Spoofing

    - + @@ -30636,7 +35296,8 @@

    Statistical Bias

    @@ -30718,6 +35379,7 @@

    System Failure

    @@ -30731,7 +35393,7 @@

    System Failure

    - + @@ -30777,37 +35439,124 @@

    System Failure

    - -
    -

    System Intrusion

    + +
    +

    System Intrusion

    +
    TermSocietalRiskSocietalRiskConcept Prefix risk
    LabelSocietal RiskSocietal Risk Concept
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#SocietalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societyRisk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process
    Usage NoteSocietal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure
    Date Created2024-10-21
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    Broader/Parent types risk:MaliciousActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingConcept representing Spoofing
    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureConcept representing System Failure
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermSystemIntrusionPrefixrisk
    LabelSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    System Malfunction

    - + - + - + - + - @@ -30821,16 +35570,19 @@

    System Intrusion

    - + - + + + + - + @@ -30864,36 +35616,35 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Technical Risk Concept

    TermSystemIntrusionSystemMalfunction Prefix risk
    LabelSystem IntrusionSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System IntrusionConcept representing System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - @@ -30906,35 +35657,26 @@

    System Malfunction

    - + - + - - - - + - + - - - - - - - - + + @@ -30979,7 +35721,8 @@

    Terrorism

    - @@ -30993,7 +35736,7 @@

    Terrorism

    - + @@ -31218,12 +35961,7 @@

    Transphobia

    - - @@ -31303,6 +36041,7 @@

    Unauthorised Access to Premises

    @@ -31316,7 +36055,7 @@

    Unauthorised Access to Premises

    - + @@ -31390,6 +36129,7 @@

    Unauthorised Activity

    @@ -31403,7 +36143,7 @@

    Unauthorised Activity

    - + @@ -31465,6 +36205,7 @@

    Unauthorised Code Access

    @@ -31478,7 +36219,7 @@

    Unauthorised Code Access

    - + @@ -31551,6 +36292,7 @@

    Unauthorised Code Disclosure

    @@ -31564,7 +36306,7 @@

    Unauthorised Code Disclosure

    - + @@ -31637,6 +36379,7 @@

    Unauthorised Code Modification

    @@ -31650,7 +36393,7 @@

    Unauthorised Code Modification

    - + @@ -31723,6 +36466,7 @@

    Unauthorised Data Access

    @@ -31736,7 +36480,7 @@

    Unauthorised Data Access

    - + @@ -31809,6 +36553,7 @@

    Unauthorised Data Disclosure

    @@ -31822,7 +36567,7 @@

    Unauthorised Data Disclosure

    - + @@ -31895,6 +36640,7 @@

    Unauthorised Data Modification

    @@ -31908,7 +36654,7 @@

    Unauthorised Data Modification

    - + @@ -31981,6 +36727,7 @@

    Unauthorised Information Disclosure

    @@ -31994,7 +36741,7 @@

    Unauthorised Information Disclosure

    - + @@ -32067,6 +36814,7 @@

    Unauthorised Re-Identification

    @@ -32080,7 +36828,7 @@

    Unauthorised Re-Identification

    - + @@ -32150,6 +36898,7 @@

    Unauthorised Resource Use

    @@ -32163,7 +36912,7 @@

    Unauthorised Resource Use

    - + @@ -32237,6 +36986,7 @@

    Unauthorised System Access

    @@ -32250,7 +37000,7 @@

    Unauthorised System Access

    - + @@ -32323,6 +37073,7 @@

    Unauthorised System Modification

    @@ -32336,7 +37087,7 @@

    Unauthorised System Modification

    - + @@ -32410,6 +37161,7 @@

    Unwanted Code Deletion

    @@ -32423,7 +37175,7 @@

    Unwanted Code Deletion

    - + @@ -32497,6 +37249,7 @@

    Unwanted Data Deletion

    @@ -32510,7 +37263,7 @@

    Unwanted Data Deletion

    - + @@ -32583,6 +37336,7 @@

    Unwanted Disclosure of Data

    @@ -32596,7 +37350,7 @@

    Unwanted Disclosure of Data

    - + @@ -32665,7 +37419,8 @@

    User Risks

    - @@ -33251,7 +38006,9 @@

    Violating Code of Conduct

    - @@ -33264,7 +38021,7 @@

    Violating Code of Conduct

    - + @@ -33309,7 +38066,7 @@

    Violating Code of Conduct

    -

    Violation of Contractual Obligation

    +

    Violating Contractual Obligation

    TermSystemMalfunctionTechnicalRiskConcept Prefix risk
    LabelSystem MalfunctionTechnical Risk Concept
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#TechnicalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionRisk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process
    Usage NoteHere system refers to both hardware and software systemsTechnical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Broader/Parent types risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismConcept representing Terrorism
    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesConcept representing Unauthorised Access to Premises
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcept representing Unauthorised Activity
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code AccessConcept representing Unauthorised Code Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureConcept representing Unauthorised Code Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code ModificationConcept representing Unauthorised Code Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data AccessConcept representing Unauthorised Data Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureConcept representing Unauthorised Data Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data ModificationConcept representing Unauthorised Data Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureConcept representing Unauthorised Information Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationConcept representing Unauthorised Re-Identification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Resource UseConcept representing Unauthorised Resource Use
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System AccessConcept representing Unauthorised System Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System ModificationConcept representing Unauthorised System Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Code DeletionConcept representing Unwanted Code Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Data DeletionConcept representing Unwanted Data Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataConcept representing Unwanted Disclosure of Data
    Broader/Parent types dpv:RiskConcept + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Code of ConductConcept representing Violation of Code of Conduct
    Usage Note
    @@ -33320,7 +38077,7 @@

    Violation of Contractual Obligation

    - + @@ -33336,7 +38093,15 @@

    Violation of Contractual Obligation

    - + + @@ -33349,7 +38114,7 @@

    Violation of Contractual Obligation

    - + @@ -33421,7 +38186,9 @@

    Violating Ethics Code

    - @@ -33434,7 +38201,7 @@

    Violating Ethics Code

    - + @@ -33479,7 +38246,7 @@

    Violating Ethics Code

    -

    Violation of Legal Obligations

    +

    Violating Legal Obligation

    LabelViolation of Contractual ObligationViolating Contractual Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsConcept representing Violation of Contractual Obligations
    Usage Note
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Ethics CodeConcept representing Violation of Ethics Code
    Usage Note
    @@ -33490,7 +38257,7 @@

    Violation of Legal Obligations

    - + @@ -33506,7 +38273,15 @@

    Violation of Legal Obligations

    - + + @@ -33519,7 +38294,7 @@

    Violation of Legal Obligations

    - + @@ -33563,6 +38338,81 @@

    Violation of Legal Obligations

    +
    +

    Violating Obligation

    +
    LabelViolation of Legal ObligationsViolating Legal Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Legal ObligationsConcept representing Violation of Legal Obligations
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingObligationPrefixrisk
    LabelViolating Obligation
    IRIhttps://w3id.org/dpv/risk#ViolatingObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +

    Violating Policy

    @@ -33591,7 +38441,9 @@

    Violating Policy

    - @@ -33604,7 +38456,7 @@

    Violating Policy

    - + @@ -33633,8 +38485,83 @@

    Violating Policy

    +
    +

    Violating Prohibition

    +
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policyConcept representing violation of policy which can be either internal or external policy
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingProhibitionPrefixrisk
    LabelViolating Prohibition
    IRIhttps://w3id.org/dpv/risk#ViolatingProhibition
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +
    -

    Violation of Statutory Obligations

    +

    Violating Statutory Obligations

    @@ -33645,7 +38572,7 @@

    Violation of Statutory Obligations

    - + @@ -33661,7 +38588,15 @@

    Violation of Statutory Obligations

    - + + @@ -33674,7 +38609,7 @@

    Violation of Statutory Obligations

    - + @@ -33749,6 +38684,8 @@

    Violence against children

    @@ -33761,7 +38698,7 @@

    Violence against children

    - + @@ -34124,74 +39061,78 @@

    caused by threat

    -
    -

    caused by vulnerability

    -
    LabelViolation of Statutory ObligationsViolating Statutory Obligations
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Statutory ObligationsConcept representing Violation of Statutory Obligations
    Usage Note Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Child ViolenceConcept representing Child Violence
    Usage Note
    - - - - - - - - - - - - - - - - - - - - - - - +
    +

    caused by vulnerability

    +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability +
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK +
    +
    + + - - - - - - Range includes - risk:Vulnerability - - - - - - Definition - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - - - - - - - - - - Date Created - 2024-02-14 - - - - - - - See More: - section CORE in RISK - - - - -
    @@ -34277,12 +39218,32 @@

    caused by vulnerability

    + + + + + + + + + + + + + + + + + + + + + + - - @@ -34568,6 +39529,18 @@

    exploits vulnerability

    + + + + + + + + + + + + @@ -34646,7 +39619,7 @@

    has control

    See More: - section CORE in RISK + section CORE in DEX @@ -34994,6 +39967,48 @@

    has vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35107,6 +40122,7 @@

    has vulnerability

    +
    @@ -35497,6 +40513,61 @@

    is vulnerability of

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35696,10 +40767,100 @@

    refers to risk

    - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36640,6 +41801,12 @@

    External

    + + + + + + @@ -36658,6 +41825,12 @@

    External

    + + + + + + @@ -36672,6 +41845,7 @@

    External

    + @@ -36690,6 +41864,17 @@

    External

    + + + + + + + + + + + @@ -36792,6 +41977,18 @@

    External

    + + + + + + + + + + + + @@ -36879,6 +42076,12 @@

    External

    + + + + + + @@ -36890,6 +42093,42 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36961,6 +42200,7 @@

    External

    + @@ -37042,6 +42282,7 @@

    External

    + @@ -37075,12 +42316,36 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + @@ -37192,6 +42457,7 @@

    External

    + @@ -37210,6 +42476,11 @@

    External

    + + + + + @@ -37223,6 +42494,24 @@

    External

    + + + + + + + + + + + + + + + + + + @@ -37263,6 +42552,12 @@

    External

    + + + + + + @@ -37740,6 +43035,78 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -37770,6 +43137,7 @@

    External

    + @@ -37815,6 +43183,13 @@

    External

    + + + + + + + @@ -37992,6 +43367,16 @@

    External

    + + + + + + + + + + diff --git a/2.1-dev/risk/risk-owl.html b/2.1-dev/risk/risk-owl.html index bda885106..0bf0a79d6 100644 --- a/2.1-dev/risk/risk-owl.html +++ b/2.1-dev/risk/risk-owl.html @@ -12,7 +12,7 @@ title: "Risk Concepts", subtitle: "version 2.1-dev - OWL serialisation", publishDate: "2024-08-18", - specStatus: "CG-FINAL", + specStatus: "CG-DRAFT", group: "dpvcg", latestVersion: "https://www.w3.org/community/dpvcg/2022/12/05/dpv-v1-release/", canonicalUri: "https://w3id.org/dpv/", @@ -1276,6 +1276,7 @@

    Accidental Misuse

    Sub-class of risk-owl:Misuse → risk-owl:UserRisks + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept @@ -1289,7 +1290,7 @@

    Accidental Misuse

    Definition - Accidental Misuse + Concept representing accidental misuse (of something) @@ -1353,11 +1354,7 @@

    Age Discrimination

    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept - - Sub-class of - risk-owl:Discrimination - → risk-owl:SocietalRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -1440,6 +1437,7 @@

    Authorisation Failure

    Sub-class of risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -1453,7 +1451,7 @@

    Authorisation Failure

    Definition - Something that acts as or causes Authorisation Failure + Concept representing Authorisation Failure @@ -1533,6 +1531,7 @@

    None

    risk-owl:DataBreach → risk-owl:SecurityBreach → risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -1764,7 +1763,7 @@

    Avoid Source

    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl @@ -1847,6 +1846,7 @@

    Benefit

    risk-owl:Compensation → risk-owl:Renumeration → risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept @@ -1860,9 +1860,12 @@

    Benefit

    Definition - Something that acts as or causes benefits + Concept representing benefits - both material and immaterial - + + Usage Note + Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal + @@ -1932,7 +1935,8 @@

    Bias

    Sub-class of - risk-owl:RiskConcept + risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept @@ -2021,6 +2025,7 @@

    Blackmail

    Sub-class of risk-owl:MaliciousActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -2034,7 +2039,7 @@

    Blackmail

    Definition - Something that acts as or causes Blackmail + Concept representing Blackmail @@ -2113,6 +2118,7 @@

    Brute Force Authorisations

    Sub-class of risk-owl:SecurityAttack → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -2126,7 +2132,7 @@

    Brute Force Authorisations

    Definition - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques @@ -2202,11 +2208,7 @@

    Caste Discrimination

    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept - - Sub-class of - risk-owl:Discrimination - → risk-owl:SocietalRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -2295,7 +2297,7 @@

    Change Consequence

    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl @@ -2380,7 +2382,7 @@

    Change Impact

    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl @@ -2464,6 +2466,7 @@

    Coercion

    Sub-class of risk-owl:MaliciousActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -2477,7 +2480,7 @@

    Coercion

    Definition - Something that acts as or causes Coercion + Concept representing Coercion @@ -2553,7 +2556,8 @@

    Cognitive Bias

    Sub-class of risk-owl:Bias - → risk-owl:RiskConcept + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept @@ -2640,6 +2644,7 @@

    Compensation

    Sub-class of risk-owl:Renumeration → risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept @@ -2728,6 +2733,7 @@

    Component Failure

    Sub-class of risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -2741,7 +2747,7 @@

    Component Failure

    Definition - Something that acts as or causes Component Failure + Concept representing Component Failure Usage Note @@ -2810,6 +2816,7 @@

    Component Malfunction

    Sub-class of risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -2823,7 +2830,7 @@

    Component Malfunction

    Definition - Something that acts as or causes Component Malfunction + Concept representing Component Malfunction Usage Note @@ -2896,6 +2903,7 @@

    Compromise Account

    Sub-class of risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -2909,7 +2917,7 @@

    Compromise Account

    Definition - Something that acts as or causes a compromised account that is then used by the compromiser + Concept representing a compromised account that is then used by the compromiser @@ -2987,6 +2995,7 @@

    Compromise Account Credentials

    Sub-class of risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -3000,7 +3009,7 @@

    Compromise Account Credentials

    Definition - Something that acts as or causes Account Credentials to be compromised + Concept representing Account Credentials to be compromised @@ -3080,6 +3089,7 @@

    Confidentiality Breach

    risk-owl:DataBreach → risk-owl:SecurityBreach → risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept @@ -3093,7 +3103,7 @@

    Confidentiality Breach

    Definition - Something that acts as or causes Confidentiality Breach + Concept representing Confidentiality Breach @@ -3323,7 +3333,8 @@

    Confirmation Bias

    Sub-class of risk-owl:CognitiveBias → risk-owl:Bias - → risk-owl:RiskConcept + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept @@ -3411,7 +3422,8 @@

    Confounding Variables Bias

    risk-owl:StatisticalBias → risk-owl:DataBias → risk-owl:Bias - → risk-owl:RiskConcept + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept @@ -3500,7 +3512,7 @@

    Consequence Control

    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl @@ -3584,7 +3596,7 @@

    Containment Control

    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl @@ -3659,263 +3671,14 @@

    Copyright Violation

    Sub-class of - risk-owl:ViolatingObligation - - - - - - - - - - - - Definition - Something that acts as or causes Copyright Violation - - - - - - - - Source - ENISA Reference Incident Classification Taxonomy 2018 - - - - - - Date Created - 2022-08-17 - - - Date Modified - 2024-08-16 - - - Contributors - Harshvardhan J. Pandit - - - Documented in - Risk Risk-taxonomy - - - -
    - - - - - - - - -
    -

    Coverage Bias

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCoverageBiasPrefixrisk-owl
    LabelCoverage Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CoverageBias
    - https://w3id.org/dpv/risk#CoverageBias -
    Type rdfs:Class - , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept -
    Sub-class of risk-owl:SelectionBias - → risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept -
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    -
    - - -
    -

    Cross-Border Incident

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermCrossBorderIncidentPrefixrisk-owl
    LabelCross-Border Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#CrossBorderIncident
    - https://w3id.org/dpv/risk#CrossBorderIncident -
    Type rdfs:Class - , owl:Class -
    Sub-class of risk-owl:Incident + risk-owl:LegalComplianceRisk + → risk-owl:LegalRiskConcept → dpv-owl:RiskConcept -
    in Range of risk-owl:hasIncident -
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    Documented inRisk Incident
    -
    - - - - - - -
    -

    Cryptojacking

    - - - - - - - - - - - - - - - - - - - - - - - - + - @@ -3929,7 +3692,7 @@

    Cryptojacking

    - + @@ -3938,7 +3701,7 @@

    Cryptojacking

    - + @@ -3962,31 +3725,33 @@

    Cryptojacking

    TermCryptojackingPrefixrisk-owl
    LabelCryptojacking
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Cryptojacking
    - https://w3id.org/dpv/risk#Cryptojacking -
    Type rdfs:Class - , owl:Class - , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource -
    Sub-class of risk-owl:SecurityAttack - → risk-owl:ExternalSecurityThreat + risk-owl:ViolatingObligation + → risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes CryptojackingConcept representing Copyright Violation
    SourceENISA Threat Landscape 2021ENISA Reference Incident Classification Taxonomy 2018
    + + -
    -

    Damage

    +
    +

    Coverage Bias

    - + - + @@ -3995,16 +3760,20 @@

    Damage

    - @@ -4018,28 +3787,28 @@

    Damage

    - + - + + + + - + - - - - + - + @@ -4050,29 +3819,105 @@

    Damage

    +
    +

    Cross-Border Incident

    +
    TermDamageCoverageBias Prefix risk-owl
    LabelDamageCoverage Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Damage
    - https://w3id.org/dpv/risk#Damage + https://w3id.org/dpv/risk/owl/#CoverageBias
    + https://w3id.org/dpv/risk#CoverageBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:LegalRisk + risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes DamageBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2022-03-302024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCrossBorderIncidentPrefixrisk-owl
    LabelCross-Border Incident
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#CrossBorderIncident
    + https://w3id.org/dpv/risk#CrossBorderIncident +
    Type rdfs:Class + , owl:Class +
    Sub-class of risk-owl:Incident + → dpv-owl:RiskConcept +
    in Range of risk-owl:hasIncident +
    DefinitionIncident involving cross-border or multiple jurisdictions
    Date Created2024-05-19
    Documented inRisk Incident
    +
    -
    -

    Data Aggregation Bias

    + + + +
    +

    Cryptojacking

    - + - + @@ -4081,18 +3926,19 @@

    Data Aggregation Bias

    - @@ -4105,7 +3951,7 @@

    Data Aggregation Bias

    - + @@ -4114,19 +3960,22 @@

    Data Aggregation Bias

    - + - + - + + + + - + @@ -4141,25 +3990,25 @@

    Data Aggregation Bias

    -
    -

    Data Bias

    +
    +

    Customer Support Limited

    TermDataAggregationBiasCryptojacking Prefix risk-owl
    LabelData Aggregation BiasCryptojacking
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DataAggregationBias
    - https://w3id.org/dpv/risk#DataAggregationBias + https://w3id.org/dpv/risk/owl/#Cryptojacking
    + https://w3id.org/dpv/risk#Cryptojacking
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataConcept representing Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented in
    - + - + @@ -4168,17 +4017,18 @@

    Data Bias

    - @@ -4191,29 +4041,23 @@

    Data Bias

    - + - - - - + - + - - - - + @@ -4227,28 +4071,25 @@

    Data Bias

    - - - -
    -

    Data Breach

    +
    +

    Damage

    TermDataBiasCustomerSupportLimited Prefix risk-owl
    LabelData BiasCustomer Support Limited
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DataBias
    - https://w3id.org/dpv/risk#DataBias + https://w3id.org/dpv/risk/owl/#CustomerSupportLimited
    + https://w3id.org/dpv/risk#CustomerSupportLimited
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsConcept representing customer support to be limited
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -4258,19 +4099,16 @@

    Data Breach

    - @@ -4284,28 +4122,20 @@

    Data Breach

    - + - - - - - - - + - + @@ -4317,7 +4147,7 @@

    Data Breach

    - +
    TermDataBreachDamage Prefix risk-owl
    LabelData BreachDamage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DataBreach
    - https://w3id.org/dpv/risk#DataBreach + https://w3id.org/dpv/risk/owl/#Damage
    + https://w3id.org/dpv/risk#Damage
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:ConfidentialityConcept - , risk-owl:IntegrityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:SecurityBreach - → risk-owl:OperationalSecurityRisk + risk-owl:LegallyRelevantConsequence + → risk-owl:LegalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Data BreachConcept representing Damage
    Examples Using DPV and RISK extension to represent incidents (E0069); - Using risk controls to express how tech/org measures address the risk (E0071) -
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    Documented inDex Risk-taxonomyRisk Risk-taxonomy
    @@ -4328,26 +4158,25 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Data Aggregation Bias

    - + - + @@ -4356,17 +4185,18 @@

    Data Corruption

    - @@ -4380,34 +4210,28 @@

    Data Corruption

    - + - - - - + - + - + - - - - + - + @@ -4422,25 +4246,25 @@

    Data Corruption

    -
    -

    Data Processing Bias

    +
    +

    Data Bias

    TermDataCorruptionDataAggregationBias Prefix risk-owl
    LabelData CorruptionData Aggregation Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DataCorruption
    - https://w3id.org/dpv/risk#DataCorruption + https://w3id.org/dpv/risk/owl/#DataAggregationBias
    + https://w3id.org/dpv/risk#DataAggregationBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:IntegrityConcept , risk-owl:PotentialConsequence , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Corruption of DataBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in
    - + - + @@ -4458,9 +4282,9 @@

    Data Processing Bias

    - @@ -4473,7 +4297,7 @@

    Data Processing Bias

    - + @@ -4505,25 +4329,32 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + + + + + + + +
    +

    Data Breach

    TermDataProcessingBiasDataBias Prefix risk-owl
    LabelData Processing BiasData Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DataProcessingBias
    - https://w3id.org/dpv/risk#DataProcessingBias + https://w3id.org/dpv/risk/owl/#DataBias
    + https://w3id.org/dpv/risk#DataBias
    Sub-class of risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    - + - + @@ -4532,21 +4363,26 @@

    Deliberate Incident

    - - - - - + @@ -4555,26 +4391,40 @@

    Deliberate Incident

    - + + + + - + + + + - + - - + + + + + + + + - +
    TermDeliberateIncidentDataBreach Prefix risk-owl
    LabelDeliberate IncidentData Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DeliberateIncident
    - https://w3id.org/dpv/risk#DeliberateIncident + https://w3id.org/dpv/risk/owl/#DataBreach
    + https://w3id.org/dpv/risk#DataBreach
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:Incident + risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident caused due to deliberate actions of a humanConcept representing Data Breach
    Examples Using DPV and RISK extension to represent incidents (E0069); + Using risk controls to express how tech/org measures address the risk (E0071) +
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentDex Risk-taxonomy
    @@ -4585,25 +4435,26 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    + +
    +

    Data Corruption

    - + - + @@ -4613,7 +4464,8 @@

    Denial of Service Attack (DoS)

    @@ -4621,8 +4473,8 @@

    Denial of Service Attack (DoS)

    - @@ -4636,9 +4488,12 @@

    Denial of Service Attack (DoS)

    - + - + + + + @@ -4672,25 +4527,28 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    + + + +
    +

    Data Processing Bias

    TermDenialServiceAttackDataCorruption Prefix risk-owl
    LabelDenial of Service Attack (DoS)Data Corruption
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DenialServiceAttack
    - https://w3id.org/dpv/risk#DenialServiceAttack + https://w3id.org/dpv/risk/owl/#DataCorruption
    + https://w3id.org/dpv/risk#DataCorruption
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:SecurityAttack - → risk-owl:ExternalSecurityThreat + risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Concept representing Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    - + - + @@ -4699,25 +4557,23 @@

    Detection Control

    - - - - - + @@ -4726,26 +4582,32 @@

    Detection Control

    - + - + + + + - + - + + + + - +
    TermDetectionControlDataProcessingBias Prefix risk-owl
    LabelDetection ControlData Processing Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DetectionControl
    - https://w3id.org/dpv/risk#DetectionControl + https://w3id.org/dpv/risk/owl/#DataProcessingBias
    + https://w3id.org/dpv/risk#DataProcessingBias
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to detect eventBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -4755,25 +4617,26 @@

    Detection Control

    -
    -

    Detriment

    + +
    +

    Delayed Application Processing

    - + - + @@ -4784,13 +4647,15 @@

    Detriment

    , owl:Class , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - @@ -4804,7 +4669,7 @@

    Detriment

    - + @@ -4817,16 +4682,10 @@

    Detriment

    - + - - - - - - - - + + @@ -4836,29 +4695,25 @@

    Detriment

    - - - - -
    -

    Direct Discrimination

    +
    +

    Deliberate Incident

    TermDetrimentDelayedApplicationProcessing Prefix risk-owl
    LabelDetrimentDelayed Application Processing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Detriment
    - https://w3id.org/dpv/risk#Detriment + https://w3id.org/dpv/risk/owl/#DelayedApplicationProcessing
    + https://w3id.org/dpv/risk#DelayedApplicationProcessing
    Sub-class of risk-owl:LegalRisk + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes DetrimentConcept representing delayed processing of applications
    Date Created2022-03-232024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    Documented in Risk Risk-taxonomy
    - + - + @@ -4867,26 +4722,21 @@

    Direct Discrimination

    - - - - + + + + @@ -4895,7 +4745,7 @@

    Direct Discrimination

    - + @@ -4908,13 +4758,13 @@

    Direct Discrimination

    - + - +
    TermDirectDiscriminationDeliberateIncident Prefix risk-owl
    LabelDirect DiscriminationDeliberate Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DirectDiscrimination
    - https://w3id.org/dpv/risk#DirectDiscrimination + https://w3id.org/dpv/risk/owl/#DeliberateIncident
    + https://w3id.org/dpv/risk#DeliberateIncident
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk + risk-owl:Incident → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident +
    DefinitionOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)Incident caused due to deliberate actions of a human
    Date Created2024-09-302024-05-19
    Documented inRisk Risk-taxonomyRisk Incident
    @@ -4925,25 +4775,25 @@

    Direct Discrimination

    -
    -

    Disability Discrimination

    +
    +

    Denial of Service Attack (DoS)

    - + - + @@ -4952,21 +4802,18 @@

    Disability Discrimination

    - - - @@ -4980,23 +4827,32 @@

    Disability Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -5007,29 +4863,25 @@

    Disability Discrimination

    - - - - -
    -

    Discrimination

    +
    +

    Detection Control

    TermDisabilityDiscriminationDenialServiceAttack Prefix risk-owl
    LabelDisability DiscriminationDenial of Service Attack (DoS)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DisabilityDiscrimination
    - https://w3id.org/dpv/risk#DisabilityDiscrimination + https://w3id.org/dpv/risk/owl/#DenialServiceAttack
    + https://w3id.org/dpv/risk#DenialServiceAttack
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk + risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionDiscrimination against individuals based on physical or mental disabilitiesConcept representing Denial of Service Attack (DoS)
    SourceISO/IEC 27005:2018
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -5038,25 +4890,25 @@

    Discrimination

    - - - - + + + + @@ -5065,7 +4917,7 @@

    Discrimination

    - + @@ -5078,19 +4930,13 @@

    Discrimination

    - + - - - - - - - - + + - +
    TermDiscriminationDetectionControl Prefix risk-owl
    LabelDiscriminationDetection Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Discrimination
    - https://w3id.org/dpv/risk#Discrimination + https://w3id.org/dpv/risk/owl/#DetectionControl
    + https://w3id.org/dpv/risk#DetectionControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:RiskConcept -
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    Definition[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]Control to detect event
    Date Created2024-09-302024-05-19
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    Documented inRisk Risk-taxonomyRisk Risk-controls
    @@ -5101,25 +4947,25 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Detriment

    - + - + @@ -5129,17 +4975,16 @@

    Distributed Denial of Service Attack (DDoS)

    - @@ -5153,23 +4998,20 @@

    Distributed Denial of Service Attack (DDoS)

    - + - - - - + - + @@ -5177,7 +5019,7 @@

    Distributed Denial of Service Attack (DDoS)

    - + @@ -5188,25 +5030,29 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    + + + + +
    +

    Direct Discrimination

    TermDistributedDenialServiceAttackDetriment Prefix risk-owl
    LabelDistributed Denial of Service Attack (DDoS)Detriment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#DistributedDenialServiceAttack
    - https://w3id.org/dpv/risk#DistributedDenialServiceAttack + https://w3id.org/dpv/risk/owl/#Detriment
    + https://w3id.org/dpv/risk#Detriment
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:DenialServiceAttack - → risk-owl:SecurityAttack - → risk-owl:ExternalSecurityThreat + risk-owl:LegallyRelevantConsequence + → risk-owl:LegalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Concept representing Detriment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-23
    Date Modified
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    Documented in
    - + - + @@ -5215,21 +5061,22 @@

    Environmental Incident

    - - - - - + @@ -5238,7 +5085,7 @@

    Environmental Incident

    - + @@ -5251,13 +5098,13 @@

    Environmental Incident

    - + - +
    TermEnvironmentalIncidentDirectDiscrimination Prefix risk-owl
    LabelEnvironmental IncidentDirect Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EnvironmentalIncident
    - https://w3id.org/dpv/risk#EnvironmentalIncident + https://w3id.org/dpv/risk/owl/#DirectDiscrimination
    + https://w3id.org/dpv/risk#DirectDiscrimination
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:Incident + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionIncident caused due to environmental factors outside human controlsOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2024-05-192024-09-30
    Documented inRisk IncidentRisk Risk-taxonomy
    @@ -5268,25 +5115,25 @@

    Environmental Incident

    -
    -

    Environmental Risk

    +
    +

    Disability Discrimination

    - + - + @@ -5295,16 +5142,18 @@

    Environmental Risk

    - @@ -5317,7 +5166,7 @@

    Environmental Risk

    - + @@ -5328,7 +5177,10 @@

    Environmental Risk

    - + + + + @@ -5344,26 +5196,25 @@

    Environmental Risk

    - -
    -

    Equipment Failure

    +
    +

    Discrimination

    TermEnvironmentalRiskDisabilityDiscrimination Prefix risk-owl
    LabelEnvironmental RiskDisability Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EnvironmentalRisk
    - https://w3id.org/dpv/risk#EnvironmentalRisk + https://w3id.org/dpv/risk/owl/#DisabilityDiscrimination
    + https://w3id.org/dpv/risk#DisabilityDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of dpv-owl:RiskConcept + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeDiscrimination against individuals based on physical or mental disabilities
    Date Created2024-09-30
    - + - + @@ -5372,17 +5223,16 @@

    Equipment Failure

    - @@ -5396,34 +5246,25 @@

    Equipment Failure

    - + - - - - + - - - - + - + - - - - + - + @@ -5438,26 +5279,25 @@

    Equipment Failure

    - -
    -

    Equipment Malfunction

    +
    +

    Disproportionate Energy Consumption

    TermEquipmentFailureDiscrimination Prefix risk-owl
    LabelEquipment FailureDiscrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EquipmentFailure
    - https://w3id.org/dpv/risk#EquipmentFailure + https://w3id.org/dpv/risk/owl/#Discrimination
    + https://w3id.org/dpv/risk#Discrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Equipment FailureDiscrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog
    Documented in
    - + - + @@ -5467,17 +5307,15 @@

    Equipment Malfunction

    - @@ -5490,35 +5328,23 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - - - - - + + @@ -5532,25 +5358,25 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermEquipmentMalfunctionDisproportionateEnergyConsumption Prefix risk-owl
    LabelEquipment MalfunctionDisproportionate Energy Consumption
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EquipmentMalfunction
    - https://w3id.org/dpv/risk#EquipmentMalfunction + https://w3id.org/dpv/risk/owl/#DisproportionateEnergyConsumption
    + https://w3id.org/dpv/risk#DisproportionateEnergyConsumption
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Equipment MalfunctionThe occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -5560,7 +5386,7 @@

    Erroneous System Use

    @@ -5568,7 +5394,10 @@

    Erroneous System Use

    - @@ -5582,7 +5411,7 @@

    Erroneous System Use

    - + @@ -5621,25 +5450,25 @@

    Erroneous System Use

    -
    -

    Ethnic Discrimination

    +
    +

    Earthquake

    TermErroneousSystemUseDistributedDenialServiceAttack Prefix risk-owl
    LabelErroneous System UseDistributed Denial of Service Attack (DDoS)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ErroneousSystemUse
    - https://w3id.org/dpv/risk#ErroneousSystemUse + https://w3id.org/dpv/risk/owl/#DistributedDenialServiceAttack
    + https://w3id.org/dpv/risk#DistributedDenialServiceAttack
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence + , risk-owl:AvailabilityConcept , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:UserRisks + risk-owl:DenialServiceAttack + → risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Erroneous System UseConcept representing Distributed Denial of Service Attack (DDoS)
    - + - + @@ -5648,24 +5477,16 @@

    Ethnic Discrimination

    - - - @@ -5678,7 +5499,7 @@

    Ethnic Discrimination

    - + @@ -5691,7 +5512,7 @@

    Ethnic Discrimination

    - + @@ -5704,29 +5525,105 @@

    Ethnic Discrimination

    +
    +

    Environmental Incident

    +
    TermEthnicDiscriminationEarthquake Prefix risk-owl
    LabelEthnic DiscriminationEarthquake
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#EthnicDiscrimination
    - https://w3id.org/dpv/risk#EthnicDiscrimination + https://w3id.org/dpv/risk/owl/#Earthquake
    + https://w3id.org/dpv/risk#Earthquake
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Racism - → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Racism - → risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionDiscrimination against individuals based on their ethnicity or cultural heritageThe occurence or potential occurence of earthquakes
    Date Created2024-09-302024-10-21
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermEnvironmentalIncidentPrefixrisk-owl
    LabelEnvironmental Incident
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#EnvironmentalIncident
    + https://w3id.org/dpv/risk#EnvironmentalIncident +
    Type rdfs:Class + , owl:Class +
    Sub-class of risk-owl:Incident + → dpv-owl:RiskConcept +
    in Range of risk-owl:hasIncident +
    DefinitionIncident caused due to environmental factors outside human controls
    Date Created2024-05-19
    Documented inRisk Incident
    +
    -
    -

    Excellence Discrimination

    + + + +
    +

    Environmental Risk

    - + - + @@ -5735,21 +5632,16 @@

    Excellence Discrimination

    - - - @@ -5763,7 +5655,7 @@

    Excellence Discrimination

    - + @@ -5776,7 +5668,7 @@

    Excellence Discrimination

    - + @@ -5794,26 +5686,25 @@

    Excellence Discrimination

    - -
    -

    Exposure to Harmful Speech

    +
    +

    Equipment Failure

    TermExcellenceDiscriminationEnvironmentalRisk Prefix risk-owl
    LabelExcellence DiscriminationEnvironmental Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExcellenceDiscrimination
    - https://w3id.org/dpv/risk#ExcellenceDiscrimination + https://w3id.org/dpv/risk/owl/#EnvironmentalRisk
    + https://w3id.org/dpv/risk#EnvironmentalRisk
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk + risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of othersRisks and issues that have their origin in environment or can affect the environment at large
    Date Created2024-09-302024-10-21
    - + - + @@ -5823,15 +5714,17 @@

    Exposure to Harmful Speech

    - @@ -5845,11 +5738,11 @@

    Exposure to Harmful Speech

    - + - + @@ -5857,7 +5750,7 @@

    Exposure to Harmful Speech

    - + @@ -5885,25 +5778,28 @@

    Exposure to Harmful Speech

    -
    -

    External Security Threat

    + + + +
    +

    Equipment Malfunction

    TermExposureToHarmfulSpeechEquipmentFailure Prefix risk-owl
    LabelExposure to Harmful SpeechEquipment Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
    - https://w3id.org/dpv/risk#ExposureToHarmfulSpeech + https://w3id.org/dpv/risk/owl/#EquipmentFailure
    + https://w3id.org/dpv/risk#EquipmentFailure
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:SocietalRisk + risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Harmful SpeechConcept representing Equipment Failure
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0Here equipment refers to physical equipment
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + @@ -5913,13 +5809,18 @@

    External Security Threat

    - @@ -5932,20 +5833,35 @@

    External Security Threat

    - + - + + + + - + + + + - - - + + + + + + + + + + + + @@ -5959,26 +5875,25 @@

    External Security Threat

    - -
    -

    Extorsion

    +
    +

    Erroneous Use

    TermExternalSecurityThreatEquipmentMalfunction Prefix risk-owl
    LabelExternal Security ThreatEquipment Malfunction
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
    - https://w3id.org/dpv/risk#ExternalSecurityThreat + https://w3id.org/dpv/risk/owl/#EquipmentMalfunction
    + https://w3id.org/dpv/risk#EquipmentMalfunction
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept + risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionConcepts associated with security threats that are likely to originate externallyConcept representing Equipment Malfunction
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -5988,7 +5903,6 @@

    Extorsion

    - @@ -6012,7 +5926,7 @@

    Extorsion

    - + @@ -6021,7 +5935,7 @@

    Extorsion

    - + @@ -6048,25 +5962,28 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    + + + +
    +

    Ethnic Discrimination

    TermExtorsionErroneousUse Prefix risk-owl
    LabelExtorsionErroneous Use
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Extorsion
    - https://w3id.org/dpv/risk#Extorsion + https://w3id.org/dpv/risk/owl/#ErroneousUse
    + https://w3id.org/dpv/risk#ErroneousUse
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept , risk-owl:PotentialConsequence , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource @@ -5997,8 +5911,8 @@

    Extorsion

    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat + risk-owl:UserRisks + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes ExtorsionConcept representing erroneous use (of something)
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    - + - + @@ -6075,22 +5992,23 @@

    Extremely High Likelihood

    - - - - - + @@ -6099,12 +6017,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -6115,16 +6030,13 @@

    Extremely High Likelihood

    - + - - - - + - +
    TermExtremelyHighLikelihoodEthnicDiscrimination Prefix risk-owl
    LabelExtremely High LikelihoodEthnic Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyHighLikelihood
    - https://w3id.org/dpv/risk#ExtremelyHighLikelihood + https://w3id.org/dpv/risk/owl/#EthnicDiscrimination
    + https://w3id.org/dpv/risk#EthnicDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:Racism + → risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely HighDiscrimination against individuals based on their ethnicity or cultural heritage
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -6132,25 +6044,28 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    + + + +
    +

    Excellence Discrimination

    - + - + @@ -6159,22 +6074,22 @@

    Extremely High Risk

    - - - - - + @@ -6183,12 +6098,9 @@

    Extremely High Risk

    - + - - - - + @@ -6199,16 +6111,13 @@

    Extremely High Risk

    - + - - - - + - +
    TermExtremelyHighRiskExcellenceDiscrimination Prefix risk-owl
    LabelExtremely High RiskExcellence Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyHighRisk
    - https://w3id.org/dpv/risk#ExtremelyHighRisk + https://w3id.org/dpv/risk/owl/#ExcellenceDiscrimination
    + https://w3id.org/dpv/risk#ExcellenceDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is Extremely HighFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -6216,25 +6125,30 @@

    Extremely High Risk

    -
    -

    Extremely High Severity

    + + + + + +
    +

    Exposure to Harmful Speech

    - + - + @@ -6243,22 +6157,22 @@

    Extremely High Severity

    - - - - - + @@ -6267,32 +6181,38 @@

    Extremely High Severity

    - + - + - + + + + - + - + + + + - +
    TermExtremelyHighSeverityExposureToHarmfulSpeech Prefix risk-owl
    LabelExtremely High SeverityExposure to Harmful Speech
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyHighSeverity
    - https://w3id.org/dpv/risk#ExtremelyHighSeverity + https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
    + https://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is Extremely HighConcept representing Harmful Speech
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1This concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -6300,25 +6220,26 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    + +
    +

    External Security Threat

    - + - + @@ -6327,22 +6248,19 @@

    Extremely Low Likelihood

    - - - - - + @@ -6351,12 +6269,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -6365,18 +6280,12 @@

    Extremely Low Likelihood

    - - - - + + - - - - - +
    TermExtremelyLowLikelihoodExternalSecurityThreat Prefix risk-owl
    LabelExtremely Low LikelihoodExternal Security Threat
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyLowLikelihood
    - https://w3id.org/dpv/risk#ExtremelyLowLikelihood + https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
    + https://w3id.org/dpv/risk#ExternalSecurityThreat
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowConcepts associated with security threats that are likely to originate externally
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -6384,25 +6293,29 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    + + + + +
    +

    Extorsion

    - + - + @@ -6411,22 +6324,24 @@

    Extremely Low Risk

    - - - - - + @@ -6435,32 +6350,35 @@

    Extremely Low Risk

    - + - - - - + - + + + + - + - + + + + - +
    TermExtremelyLowRiskExtorsion Prefix risk-owl
    LabelExtremely Low RiskExtorsion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyLowRisk
    - https://w3id.org/dpv/risk#ExtremelyLowRisk + https://w3id.org/dpv/risk/owl/#Extorsion
    + https://w3id.org/dpv/risk#Extorsion
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowConcept representing Extorsion
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -6468,25 +6386,25 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    +
    +

    Extremely High Likelihood

    - + - + @@ -6495,20 +6413,20 @@

    Extremely Low Severity

    - - @@ -6519,11 +6437,11 @@

    Extremely Low Severity

    - + - + @@ -6552,28 +6470,25 @@

    Extremely Low Severity

    - - - -
    -

    Financial Impact

    +
    +

    Extremely High Risk

    TermExtremelyLowSeverityExtremelyHighLikelihood Prefix risk-owl
    LabelExtremely Low SeverityExtremely High Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ExtremelyLowSeverity
    - https://w3id.org/dpv/risk#ExtremelyLowSeverity + https://w3id.org/dpv/risk/owl/#ExtremelyHighLikelihood
    + https://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:Likelihood
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Range of dpv-owl:hasSeverity + dpv-owl:hasLikelihood
    DefinitionLevel where Severity is Extremely LowLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    - + - + @@ -6582,20 +6497,22 @@

    Financial Impact

    - - + + + + @@ -6604,9 +6521,12 @@

    Financial Impact

    - + - + + + + @@ -6615,12 +6535,18 @@

    Financial Impact

    - - + + + + + + + + - +
    TermFinancialImpactExtremelyHighRisk Prefix risk-owl
    LabelFinancial ImpactExtremely High Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialImpact
    - https://w3id.org/dpv/risk#FinancialImpact + https://w3id.org/dpv/risk/owl/#ExtremelyHighRisk
    + https://w3id.org/dpv/risk#ExtremelyHighRisk
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , dpv-owl:RiskLevel
    Sub-class of dpv-owl:RiskConcept + risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Range of dpv-owl:hasRiskLevel +
    DefinitionThings that cause or have the potential to impact financial resourcesLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -6628,28 +6554,25 @@

    Financial Impact

    - - - -
    -

    Financial Loss

    +
    +

    Extremely High Severity

    - + - + @@ -6658,21 +6581,22 @@

    Financial Loss

    - - + + + + @@ -6681,35 +6605,32 @@

    Financial Loss

    - + - + + + + - - - - + - + - - - - + - +
    TermFinancialLossExtremelyHighSeverity Prefix risk-owl
    LabelFinancial LossExtremely High Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#FinancialLoss
    - https://w3id.org/dpv/risk#FinancialLoss + https://w3id.org/dpv/risk/owl/#ExtremelyHighSeverity
    + https://w3id.org/dpv/risk#ExtremelyHighSeverity
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , dpv-owl:Severity
    Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Range of dpv-owl:hasSeverity +
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -6717,29 +6638,25 @@

    Financial Loss

    - - - - -
    -

    Fraud

    +
    +

    Extremely Low Likelihood

    - + - + @@ -6748,23 +6665,22 @@

    Fraud

    - - + + + + @@ -6773,35 +6689,32 @@

    Fraud

    - + - + + + + - - - - + - + - - - - + - +
    TermFraudExtremelyLowLikelihood Prefix risk-owl
    LabelFraudExtremely Low Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Fraud
    - https://w3id.org/dpv/risk#Fraud + https://w3id.org/dpv/risk/owl/#ExtremelyLowLikelihood
    + https://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , dpv-owl:Likelihood
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Range of dpv-owl:hasLikelihood +
    DefinitionSomething that acts as or causes FraudLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -6809,28 +6722,25 @@

    Fraud

    - - - -
    -

    Gender Discrimination

    +
    +

    Extremely Low Risk

    - + - + @@ -6839,28 +6749,22 @@

    Gender Discrimination

    - - - - + + + + @@ -6869,9 +6773,12 @@

    Gender Discrimination

    - + - + + + + @@ -6882,13 +6789,16 @@

    Gender Discrimination

    - + - + + + + - +
    TermGenderDiscriminationExtremelyLowRisk Prefix risk-owl
    LabelGender DiscriminationExtremely Low Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#GenderDiscrimination
    - https://w3id.org/dpv/risk#GenderDiscrimination + https://w3id.org/dpv/risk/owl/#ExtremelyLowRisk
    + https://w3id.org/dpv/risk#ExtremelyLowRisk
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , dpv-owl:RiskLevel
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Range of dpv-owl:hasRiskLevel +
    DefinitionDiscrimination based on a person's gender identity or gender expressionLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-09-302022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -6896,28 +6806,25 @@

    Gender Discrimination

    - - - -
    -

    Geographic Discrimination

    +
    +

    Extremely Low Severity

    - + - + @@ -6926,26 +6833,22 @@

    Geographic Discrimination

    - - - - + + + + @@ -6954,9 +6857,12 @@

    Geographic Discrimination

    - + - + + + + @@ -6967,13 +6873,16 @@

    Geographic Discrimination

    - + - + + + + - +
    TermGeographicDiscriminationExtremelyLowSeverity Prefix risk-owl
    LabelGeographic DiscriminationExtremely Low Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#GeographicDiscrimination
    - https://w3id.org/dpv/risk#GeographicDiscrimination + https://w3id.org/dpv/risk/owl/#ExtremelyLowSeverity
    + https://w3id.org/dpv/risk#ExtremelyLowSeverity
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , dpv-owl:Severity
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Range of dpv-owl:hasSeverity +
    DefinitionDiscrimination based on a person's geographical origin or residenceLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2024-09-302022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -6984,25 +6893,25 @@

    Geographic Discrimination

    -
    -

    Group Attribution Bias

    +
    +

    Financial Impact

    - + - + @@ -7011,18 +6920,17 @@

    Group Attribution Bias

    - @@ -7035,29 +6943,23 @@

    Group Attribution Bias

    - + - - - - + - + - - - - + @@ -7068,25 +6970,28 @@

    Group Attribution Bias

    -
    -

    Halt Source

    + + + +
    +

    Financial Loss

    TermGroupAttributionBiasFinancialImpact Prefix risk-owl
    LabelGroup Attribution BiasFinancial Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#GroupAttributionBias
    - https://w3id.org/dpv/risk#GroupAttributionBias + https://w3id.org/dpv/risk/owl/#FinancialImpact
    + https://w3id.org/dpv/risk#FinancialImpact
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupThings that cause or have the potential to impact financial resources
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -7095,26 +7000,22 @@

    Halt Source

    - - - - - + @@ -7123,29 +7024,35 @@

    Halt Source

    - + - + + + + - + - + + + + - +
    TermHaltSourceFinancialLoss Prefix risk-owl
    LabelHalt SourceFinancial Loss
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HaltSource
    - https://w3id.org/dpv/risk#HaltSource + https://w3id.org/dpv/risk/owl/#FinancialLoss
    + https://w3id.org/dpv/risk#FinancialLoss
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:SourceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that halts the risk source or prevents it from materialisingConcept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -7156,25 +7063,25 @@

    Halt Source

    -
    -

    Harassment

    +
    +

    Floods

    - + - + @@ -7192,8 +7099,7 @@

    Harassment

    - @@ -7204,7 +7110,10 @@

    Harassment

    - + + + + @@ -7214,7 +7123,10 @@

    Harassment

    - + + + + @@ -7230,25 +7142,26 @@

    Harassment

    -
    -

    Harm

    + +
    +

    Fraud

    TermHarassmentFloods Prefix risk-owl
    LabelHarassmentFloods
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Harassment
    - https://w3id.org/dpv/risk#Harassment + https://w3id.org/dpv/risk/owl/#Floods
    + https://w3id.org/dpv/risk#Floods
    Sub-class of risk-owl:Harm - → risk-owl:IndividualRisk + dpv-owl:RiskConcept
    DefinitionThe occurence or potential occurence of floods
    Date Created2024-10-21
    - + - + @@ -7258,15 +7171,19 @@

    Harm

    - @@ -7279,23 +7196,23 @@

    Harm

    - + - - - - + - + + + + - + @@ -7318,32 +7235,25 @@

    Harm

    - - - - - - - -
    -

    High Likelihood

    +
    +

    Gender Discrimination

    TermHarmFraud Prefix risk-owl
    LabelHarmFraud
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Harm
    - https://w3id.org/dpv/risk#Harm + https://w3id.org/dpv/risk/owl/#Fraud
    + https://w3id.org/dpv/risk#Fraud
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:IndividualRisk + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Harm to humansConcept representing Fraud
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-132022-08-17
    Date Modified
    - + - + @@ -7352,30 +7262,23 @@

    High Likelihood

    - - - - - - - - - + @@ -7384,12 +7287,9 @@

    High Likelihood

    - + - - - - + @@ -7400,16 +7300,13 @@

    High Likelihood

    - + - - - - + - +
    TermHighLikelihoodGenderDiscrimination Prefix risk-owl
    LabelHigh LikelihoodGender Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HighLikelihood
    - https://w3id.org/dpv/risk#HighLikelihood + https://w3id.org/dpv/risk/owl/#GenderDiscrimination
    + https://w3id.org/dpv/risk#GenderDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is HighDiscrimination based on a person's gender identity or gender expression
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -7417,25 +7314,28 @@

    High Likelihood

    -
    -

    High Risk

    + + + +
    +

    Geographic Discrimination

    - + - + @@ -7444,30 +7344,22 @@

    High Risk

    - - - - - - - - - + @@ -7476,12 +7368,9 @@

    High Risk

    - + - - - - + @@ -7492,16 +7381,13 @@

    High Risk

    - + - - - - + - +
    TermHighRiskGeographicDiscrimination Prefix risk-owl
    LabelHigh RiskGeographic Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HighRisk
    - https://w3id.org/dpv/risk#HighRisk + https://w3id.org/dpv/risk/owl/#GeographicDiscrimination
    + https://w3id.org/dpv/risk#GeographicDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is HighDiscrimination based on a person's geographical origin or residence
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-09-30
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -7509,25 +7395,28 @@

    High Risk

    -
    -

    High Severity

    + + + +
    +

    Group Attribution Bias

    - + - + @@ -7536,30 +7425,23 @@

    High Severity

    - - + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept + + + - - - - - - - - - + @@ -7568,32 +7450,32 @@

    High Severity

    - + - - - - + - + + + + - + - + - +
    TermHighSeverityGroupAttributionBias Prefix risk-owl
    LabelHigh SeverityGroup Attribution Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HighSeverity
    - https://w3id.org/dpv/risk#HighSeverity + https://w3id.org/dpv/risk/owl/#GroupAttributionBias
    + https://w3id.org/dpv/risk#GroupAttributionBias
    Type rdfs:Class , owl:Class - , dpv-owl:Severity -
    Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is HighBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -7604,25 +7486,25 @@

    High Severity

    -
    -

    Homophobia

    +
    +

    Societal Risk

    - + - + @@ -7631,23 +7513,16 @@

    Homophobia

    - - - @@ -7661,7 +7536,7 @@

    Homophobia

    - + @@ -7672,10 +7547,7 @@

    Homophobia

    - - - - + @@ -7688,28 +7560,25 @@

    Homophobia

    - - - -
    -

    Human Errors

    +
    +

    Halt Source

    TermHomophobiaGroupRisk Prefix risk-owl
    LabelHomophobiaSocietal Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Homophobia
    - https://w3id.org/dpv/risk#Homophobia + https://w3id.org/dpv/risk/owl/#GroupRisk
    + https://w3id.org/dpv/risk#GroupRisk
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:SexualOrientationDiscrimination - → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:SexualOrientationDiscrimination - → risk-owl:Discrimination - → risk-owl:SocietalRisk + risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionHostility or prejudice against individuals who are or are perceived to be homosexualRisks and issues that affect or have the potential to affect groups in society
    Date Created2024-09-30
    - + - + @@ -7718,21 +7587,26 @@

    Human Errors

    - - + + + + @@ -7741,35 +7615,29 @@

    Human Errors

    - + - - - - + - + - - - - + - +
    TermHumanErrorsHaltSource Prefix risk-owl
    LabelHuman ErrorsHalt Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#HumanErrors
    - https://w3id.org/dpv/risk#HumanErrors + https://w3id.org/dpv/risk/owl/#HaltSource
    + https://w3id.org/dpv/risk#HaltSource
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , risk-owl:RiskControl
    Sub-class of risk-owl:UserRisks - → dpv-owl:RiskConcept + risk-owl:SourceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Human ErrorsControl that halts the risk source or prevents it from materialising
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-controls
    @@ -7777,25 +7645,28 @@

    Human Errors

    -
    -

    Identification Control

    + + + +
    +

    Harassment

    - + - + @@ -7804,35 +7675,30 @@

    Identification Control

    - - - - - + - - - - + @@ -7842,15 +7708,12 @@

    Identification Control

    - - - - + - +
    TermIdentificationControlHarassment Prefix risk-owl
    LabelIdentification ControlHarassment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentificationControl
    - https://w3id.org/dpv/risk#IdentificationControl + https://w3id.org/dpv/risk/owl/#Harassment
    + https://w3id.org/dpv/risk#Harassment
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Harm + → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to identify characteristics of event
    Date Created2024-05-19
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -7861,26 +7724,25 @@

    Identification Control

    - -
    -

    Identity Fraud

    +
    +

    Harm

    - + - + @@ -7890,17 +7752,16 @@

    Identity Fraud

    - @@ -7914,23 +7775,23 @@

    Identity Fraud

    - + - + + + + - - - - + - + @@ -7954,25 +7815,31 @@

    Identity Fraud

    -
    -

    Identity Theft

    + + + + + + +
    +

    High Likelihood

    TermIdentityFraudHarm Prefix risk-owl
    LabelIdentity FraudHarm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentityFraud
    - https://w3id.org/dpv/risk#IdentityFraud + https://w3id.org/dpv/risk/owl/#Harm
    + https://w3id.org/dpv/risk#Harm
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat + risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Identity FraudConcept representing Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-13
    Date Modified
    - + - + @@ -7981,23 +7848,30 @@

    Identity Theft

    - + + + + - + + + + @@ -8006,35 +7880,32 @@

    Identity Theft

    - + - + + + + - - - - + - + - - - - + - +
    TermIdentityTheftHighLikelihood Prefix risk-owl
    LabelIdentity TheftHigh Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IdentityTheft
    - https://w3id.org/dpv/risk#IdentityTheft + https://w3id.org/dpv/risk/owl/#HighLikelihood
    + https://w3id.org/dpv/risk#HighLikelihood
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , dpv-owl:Likelihood
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Range of dpv-owl:hasLikelihood +
    DefinitionSomething that acts as or causes Identity TheftLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -8042,27 +7913,25 @@

    Identity Theft

    - - -
    -

    Illegal Data Processing

    +
    +

    High Risk

    - + - + @@ -8071,20 +7940,30 @@

    Illegal Data Processing

    - + + + + - + + + + @@ -8093,38 +7972,32 @@

    Illegal Data Processing

    - + - + - - - - + - + - - - - + - +
    TermIllegalDataProcessingHighRisk Prefix risk-owl
    LabelIllegal Data ProcessingHigh Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IllegalDataProcessing
    - https://w3id.org/dpv/risk#IllegalDataProcessing + https://w3id.org/dpv/risk/owl/#HighRisk
    + https://w3id.org/dpv/risk#HighRisk
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk + , dpv-owl:RiskLevel
    Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Range of dpv-owl:hasRiskLevel +
    DefinitionSomething that acts as or causes Illegal Processing of DataLevel where Risk is High
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-levels
    @@ -8132,25 +8005,25 @@

    Illegal Data Processing

    -
    -

    Impact Control

    +
    +

    High Severity

    - + - + @@ -8159,23 +8032,28 @@

    Impact Control

    - + + + + - @@ -8186,9 +8064,12 @@

    Impact Control

    - + - + + + + @@ -8199,7 +8080,7 @@

    Impact Control

    - + @@ -8208,7 +8089,7 @@

    Impact Control

    - +
    TermImpactControlHighSeverity Prefix risk-owl
    LabelImpact ControlHigh Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ImpactControl
    - https://w3id.org/dpv/risk#ImpactControl + https://w3id.org/dpv/risk/owl/#HighSeverity
    + https://w3id.org/dpv/risk#HighSeverity
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:Severity
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasSeverity
    DefinitionRisk Mitigation Measure that controls ImpactsLevel where Severity is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    Documented inRisk Risk-controlsRisk Risk-levels
    @@ -8219,25 +8100,25 @@

    Impact Control

    -
    -

    Implicit Bias

    +
    +

    Homophobia

    - + - + @@ -8247,17 +8128,18 @@

    Implicit Bias

    - @@ -8270,29 +8152,23 @@

    Implicit Bias

    - + - - - - + - + - - - - + @@ -8302,25 +8178,29 @@

    Implicit Bias

    -
    -

    Incident

    + + + + +
    +

    Human Errors

    TermImplicitBiasHomophobia Prefix risk-owl
    LabelImplicit BiasHomophobia
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ImplicitBias
    - https://w3id.org/dpv/risk#ImplicitBias + https://w3id.org/dpv/risk/owl/#Homophobia
    + https://w3id.org/dpv/risk#Homophobia
    rdfs:Class , owl:Class , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:SexualOrientationDiscrimination + → risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesHostility or prejudice against individuals who are or are perceived to be homosexual
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -8329,20 +8209,22 @@

    Incident

    - - - - - + @@ -8351,28 +8233,23 @@

    Incident

    - + - - - - - - - + - + + + + - + @@ -8380,38 +8257,37 @@

    Incident

    - + - +
    TermIncidentHumanErrors Prefix risk-owl
    LabelIncidentHuman Errors
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Incident
    - https://w3id.org/dpv/risk#Incident + https://w3id.org/dpv/risk/owl/#HumanErrors
    + https://w3id.org/dpv/risk#HumanErrors
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept + risk-owl:UserRisks + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of risk-owl:hasIncident -
    DefinitionAn actual or occured eventConcept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person
    Usage NoteIncident is realised or materialised risk
    Examples Using DPV and RISK extension to represent incidents (E0069); - Indicating personal data involved in an incident (E0070) -
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
    Documented inDex Core, Dex IncidentRisk Risk-taxonomy
    - - -
    -

    Incident Assessment Report

    + +
    +

    Identification Control

    - + - + @@ -8420,23 +8296,23 @@

    Incident Assessment Report

    - - @@ -8447,7 +8323,7 @@

    Incident Assessment Report

    - + @@ -8466,7 +8342,7 @@

    Incident Assessment Report

    - +
    TermIncidentAssessmentReportIdentificationControl Prefix risk-owl
    LabelIncident Assessment ReportIdentification Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentAssessmentReport
    - https://w3id.org/dpv/risk#IncidentAssessmentReport + https://w3id.org/dpv/risk/owl/#IdentificationControl
    + https://w3id.org/dpv/risk#IdentificationControl
    Type rdfs:Class , owl:Class + , risk-owl:RiskControl
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsControl to identify characteristics of event
    Documented inRisk IncidentRisk Risk-controls
    @@ -8474,25 +8350,29 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    + + + + +
    +

    Identity Fraud

    - + - + @@ -8501,24 +8381,24 @@

    Incident Concluded

    - - - - - + @@ -8527,54 +8407,65 @@

    Incident Concluded

    - + - + + + + - + - + + + + - +
    TermIncidentConcludedIdentityFraud Prefix risk-owl
    LabelIncident ConcludedIdentity Fraud
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentConcluded
    - https://w3id.org/dpv/risk#IncidentConcluded + https://w3id.org/dpv/risk/owl/#IdentityFraud
    + https://w3id.org/dpv/risk#IdentityFraud
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringConcept representing Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Incident-statusRisk Risk-taxonomy
    -
    -

    Incident Concluding Report

    + + + + + +
    +

    Identity Theft

    - + - + @@ -8583,25 +8474,24 @@

    Incident Concluding Report

    - - - - - + @@ -8610,51 +8500,64 @@

    Incident Concluding Report

    - + - + + + + - + - - + + + + + + + + - +
    TermIncidentConcludingReportIdentityTheft Prefix risk-owl
    LabelIncident Concluding ReportIdentity Theft
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentConcludingReport
    - https://w3id.org/dpv/risk#IncidentConcludingReport + https://w3id.org/dpv/risk/owl/#IdentityTheft
    + https://w3id.org/dpv/risk#IdentityTheft
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownConcept representing Identity Theft
    SourceENISA Threat Taxonomy 2016
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-taxonomy
    -
    -

    Incident Detection Report

    + + + + +
    +

    Identity Verification Failure

    - + - + @@ -8663,25 +8566,22 @@

    Incident Detection Report

    - - - - - + @@ -8690,7 +8590,7 @@

    Incident Detection Report

    - + @@ -8703,13 +8603,13 @@

    Incident Detection Report

    - + - +
    TermIncidentDetectionReportIdentityVerificationFailure Prefix risk-owl
    LabelIncident Detection ReportIdentity Verification Failure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentDetectionReport
    - https://w3id.org/dpv/risk#IncidentDetectionReport + https://w3id.org/dpv/risk/owl/#IdentityVerificationFailure
    + https://w3id.org/dpv/risk#IdentityVerificationFailure
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the detection of a IncidentConcept representing failure to verify identity
    Date Created2024-05-192024-10-21
    Documented inRisk IncidentRisk Risk-taxonomy
    @@ -8717,25 +8617,27 @@

    Incident Detection Report

    -
    -

    Incident Halted

    + + +
    +

    Illegal Data Processing

    - + - + @@ -8744,24 +8646,21 @@

    Incident Halted

    - - - - - + @@ -8770,54 +8669,64 @@

    Incident Halted

    - + - + + + + - + + + + - + - + + + + - +
    TermIncidentHaltedIllegalDataProcessing Prefix risk-owl
    LabelIncident HaltedIllegal Data Processing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentHalted
    - https://w3id.org/dpv/risk#IncidentHalted + https://w3id.org/dpv/risk/owl/#IllegalDataProcessing
    + https://w3id.org/dpv/risk#IllegalDataProcessing
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:LegalComplianceRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringConcept representing Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Incident-statusRisk Risk-taxonomy
    -
    -

    Incident Handling Report

    + +
    +

    Impact Control

    - + - + @@ -8826,23 +8735,23 @@

    Incident Handling Report

    - - @@ -8853,7 +8762,7 @@

    Incident Handling Report

    - + @@ -8869,35 +8778,42 @@

    Incident Handling Report

    - + + + + - +
    TermIncidentHandlingReportImpactControl Prefix risk-owl
    LabelIncident Handling ReportImpact Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentHandlingReport
    - https://w3id.org/dpv/risk#IncidentHandlingReport + https://w3id.org/dpv/risk/owl/#ImpactControl
    + https://w3id.org/dpv/risk#ImpactControl
    Type rdfs:Class , owl:Class + , risk-owl:RiskControl
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceRisk Mitigation Measure that controls Impacts
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-controls
    -
    -

    Incident Identifier

    + + + + +
    +

    Implicit Bias

    - + - + @@ -8906,10 +8822,20 @@

    Incident Identifier

    - + + + @@ -8921,51 +8847,61 @@

    Incident Identifier

    - + - + + + + - + - + + + + - +
    TermIncidentIdentifierImplicitBias Prefix risk-owl
    LabelIncident IdentifierImplicit Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentIdentifier
    - https://w3id.org/dpv/risk#IncidentIdentifier + https://w3id.org/dpv/risk/owl/#ImplicitBias
    + https://w3id.org/dpv/risk#ImplicitBias
    Type rdfs:Class , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionIdentifier associated with an incidentBias that occurs when a human makes an association or assumption based on their mental models and memories
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-taxonomy
    -
    -

    Incident Impact Assessment

    + + + + +
    +

    Inability to Enter Into Contract

    - + - + @@ -8974,28 +8910,22 @@

    Incident Impact Assessment

    - - - - - + @@ -9004,7 +8934,7 @@

    Incident Impact Assessment

    - + @@ -9017,16 +8947,13 @@

    Incident Impact Assessment

    - + - - - - + - +
    TermIncidentImpactAssessmentInabilityToEnterIntoContract Prefix risk-owl
    LabelIncident Impact AssessmentInability to Enter Into Contract
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentImpactAssessment
    - https://w3id.org/dpv/risk#IncidentImpactAssessment + https://w3id.org/dpv/risk/owl/#InabilityToEnterIntoContract
    + https://w3id.org/dpv/risk#InabilityToEnterIntoContract
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of dpv-owl:ImpactAssessment - → dpv-owl:RiskAssessment - → dpv-owl:Assessment - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasAssessment, - dpv-owl:hasImpactAssessment, - dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRiskAssessment, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk IncidentRisk Risk-taxonomy
    @@ -9034,25 +8961,28 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Inability to Establish Legal Claims

    - + - + @@ -9061,24 +8991,22 @@

    Incident Mitigated

    - - - - - + @@ -9087,7 +9015,7 @@

    Incident Mitigated

    - + @@ -9100,41 +9028,42 @@

    Incident Mitigated

    - + - - - - + - +
    TermIncidentMitigatedInabilityToEstablishLegalClaims Prefix risk-owl
    LabelIncident MitigatedInability to Establish Legal Claims
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentMitigated
    - https://w3id.org/dpv/risk#IncidentMitigated + https://w3id.org/dpv/risk/owl/#InabilityToEstablishLegalClaims
    + https://w3id.org/dpv/risk#InabilityToEstablishLegalClaims
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringStub
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-statusRisk Risk-taxonomy
    -
    -

    Incident Mitigation Measure

    + + + + +
    +

    Inability to Fulfill Legal Obligations

    - + - + @@ -9143,22 +9072,22 @@

    Incident Mitigation Measure

    - - - - - + @@ -9167,7 +9096,7 @@

    Incident Mitigation Measure

    - + @@ -9180,13 +9109,13 @@

    Incident Mitigation Measure

    - + - +
    TermIncidentMitigationMeasureInabilityToFulfillLegalObligations Prefix risk-owl
    LabelIncident Mitigation MeasureInability to Fulfill Legal Obligations
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentMitigationMeasure
    - https://w3id.org/dpv/risk#IncidentMitigationMeasure + https://w3id.org/dpv/risk/owl/#InabilityToFulfillLegalObligations
    + https://w3id.org/dpv/risk#InabilityToFulfillLegalObligations
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againStub
    Date Created2024-05-192024-10-21
    Documented inRisk IncidentRisk Risk-taxonomy
    @@ -9194,25 +9123,28 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + +
    +

    Inability to Process Payments

    - + - + @@ -9221,24 +9153,22 @@

    Incident Near Miss

    - - - - - + @@ -9247,7 +9177,7 @@

    Incident Near Miss

    - + @@ -9260,41 +9190,42 @@

    Incident Near Miss

    - + - - - - + - +
    TermIncidentNearMissInabilityToProcessPayments Prefix risk-owl
    LabelIncident Near MissInability to Process Payments
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentNearMiss
    - https://w3id.org/dpv/risk#IncidentNearMiss + https://w3id.org/dpv/risk/owl/#InabilityToProcessPayments
    + https://w3id.org/dpv/risk#InabilityToProcessPayments
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Stub
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-statusRisk Risk-taxonomy
    -
    -

    Incident Notice

    + + + + +
    +

    Inability to Protect Vital Interests

    - + - + @@ -9303,24 +9234,22 @@

    Incident Notice

    - - - - - + @@ -9329,7 +9258,7 @@

    Incident Notice

    - + @@ -9342,13 +9271,13 @@

    Incident Notice

    - + - +
    TermIncidentNoticeInabilityToProtectVitalInterests Prefix risk-owl
    LabelIncident NoticeInability to Protect Vital Interests
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentNotice
    - https://w3id.org/dpv/risk#IncidentNotice + https://w3id.org/dpv/risk/owl/#InabilityToProtectVitalInterests
    + https://w3id.org/dpv/risk#InabilityToProtectVitalInterests
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of dpv-owl:Notice - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasNotice, - dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an IncidentStub
    Date Created2024-05-192024-10-21
    Documented inRisk IncidentRisk Risk-taxonomy
    @@ -9356,25 +9285,28 @@

    Incident Notice

    -
    -

    Incident Ongoing

    + + + +
    +

    Inability to Provide Health Care

    - + - + @@ -9383,24 +9315,22 @@

    Incident Ongoing

    - - - - - + @@ -9409,7 +9339,7 @@

    Incident Ongoing

    - + @@ -9422,41 +9352,38 @@

    Incident Ongoing

    - + - - - - + - +
    TermIncidentOngoingInabilityToProvideHealthCare Prefix risk-owl
    LabelIncident OngoingInability to Provide Health Care
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentOngoing
    - https://w3id.org/dpv/risk#IncidentOngoing + https://w3id.org/dpv/risk/owl/#InabilityToProvideHealthCare
    + https://w3id.org/dpv/risk#InabilityToProvideHealthCare
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeStub
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-statusRisk Risk-taxonomy
    -
    -

    Incident Ongoing Report

    +
    +

    Incident

    - + - + @@ -9470,18 +9397,13 @@

    Incident Ongoing Report

    - - @@ -9492,10 +9414,18 @@

    Incident Ongoing Report

    - + + + + + - + + + @@ -9505,38 +9435,46 @@

    Incident Ongoing Report

    - + - - + + + + + + + + - +
    TermIncidentOngoingReportIncident Prefix risk-owl
    LabelIncident Ongoing ReportIncident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentOngoingReport
    - https://w3id.org/dpv/risk#IncidentOngoingReport + https://w3id.org/dpv/risk/owl/#Incident
    + https://w3id.org/dpv/risk#Incident
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + dpv-owl:RiskConcept
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + risk-owl:hasIncident
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples Using DPV and RISK extension to represent incidents (E0069); + Indicating personal data involved in an incident (E0070) +
    Date Created2024-05-192024-02-14
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    Documented inRisk IncidentDex Core, Dex Incident
    + + -
    -

    Incident Preliminary Report

    +
    +

    Incident Assessment Report

    - + - + @@ -9572,7 +9510,7 @@

    Incident Preliminary Report

    - + @@ -9598,25 +9536,26 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + +
    +

    Incident Concluded

    TermIncidentPreliminaryReportIncidentAssessmentReport Prefix risk-owl
    LabelIncident Preliminary ReportIncident Assessment Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentPreliminaryReport
    - https://w3id.org/dpv/risk#IncidentPreliminaryReport + https://w3id.org/dpv/risk/owl/#IncidentAssessmentReport
    + https://w3id.org/dpv/risk#IncidentAssessmentReport
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownA report describing the assessment of an incident in terms of its effects or impacts
    - + - + @@ -9625,22 +9564,22 @@

    Incident Register

    - - @@ -9651,7 +9590,7 @@

    Incident Register

    - + @@ -9664,7 +9603,7 @@

    Incident Register

    - + @@ -9673,32 +9612,32 @@

    Incident Register

    - +
    TermIncidentRegisterIncidentConcluded Prefix risk-owl
    LabelIncident RegisterIncident Concluded
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentRegister
    - https://w3id.org/dpv/risk#IncidentRegister + https://w3id.org/dpv/risk/owl/#IncidentConcluded
    + https://w3id.org/dpv/risk#IncidentConcluded
    Type rdfs:Class , owl:Class + , risk-owl:IncidentStatus
    Sub-class of dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + dpv-owl:hasContext, + dpv-owl:hasStatus
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Date Created2024-05-192024-02-14
    Documented inRisk IncidentRisk Incident-status
    -
    -

    Incident Report

    +
    +

    Incident Concluding Report

    - + - + @@ -9712,7 +9651,8 @@

    Incident Report

    - @@ -9733,7 +9673,7 @@

    Incident Report

    - + @@ -9759,25 +9699,25 @@

    Incident Report

    -
    -

    Incident Status

    +
    +

    Incident Detection Report

    TermIncidentReportIncidentConcludingReport Prefix risk-owl
    LabelIncident ReportIncident Concluding Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentReport
    - https://w3id.org/dpv/risk#IncidentReport + https://w3id.org/dpv/risk/owl/#IncidentConcludingReport
    + https://w3id.org/dpv/risk#IncidentConcludingReport
    Sub-class of dpv-owl:RecordsOfActivities + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities → dpv-owl:OrganisationalMeasure → dpv-owl:TechnicalOrganisationalMeasure
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    - + - + @@ -9791,15 +9731,18 @@

    Incident Status

    - - @@ -9810,14 +9753,10 @@

    Incident Status

    - + - - - @@ -9827,16 +9766,13 @@

    Incident Status

    - + - - - - + - +
    TermIncidentStatusIncidentDetectionReport Prefix risk-owl
    LabelIncident StatusIncident Detection Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentStatus
    - https://w3id.org/dpv/risk#IncidentStatus + https://w3id.org/dpv/risk/owl/#IncidentDetectionReport
    + https://w3id.org/dpv/risk#IncidentDetectionReport
    Sub-class of dpv-owl:Status - → dpv-owl:Context + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionStatus associated with an incidentA report describing the detection of a Incident
    Examples Using DPV and RISK extension to represent incidents (E0069) -
    Date Created2024-02-142024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inDex Incident-statusRisk Incident
    @@ -9844,25 +9780,25 @@

    Incident Status

    -
    -

    Incident Status Unknown

    +
    +

    Incident Halted

    - + - + @@ -9897,7 +9833,7 @@

    Incident Status Unknown

    - + @@ -9926,26 +9862,25 @@

    Incident Status Unknown

    - -
    -

    Incident Suspected

    +
    +

    Incident Handling Report

    TermIncidentStatusUnknownIncidentHalted Prefix risk-owl
    LabelIncident Status UnknownIncident Halted
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentStatusUnknown
    - https://w3id.org/dpv/risk#IncidentStatusUnknown + https://w3id.org/dpv/risk/owl/#IncidentHalted
    + https://w3id.org/dpv/risk#IncidentHalted
    DefinitionThe status of a incident is unknownThe incident has halted or paused with a high likelihood of resuming or recurring
    - + - + @@ -9954,22 +9889,23 @@

    Incident Suspected

    - - @@ -9980,7 +9916,7 @@

    Incident Suspected

    - + @@ -9993,41 +9929,38 @@

    Incident Suspected

    - + - - - - + - +
    TermIncidentSuspectedIncidentHandlingReport Prefix risk-owl
    LabelIncident SuspectedIncident Handling Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentSuspected
    - https://w3id.org/dpv/risk#IncidentSuspected + https://w3id.org/dpv/risk/owl/#IncidentHandlingReport
    + https://w3id.org/dpv/risk#IncidentHandlingReport
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Date Created2024-02-142024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Incident-statusRisk Incident
    -
    -

    Incident Suspected Report

    +
    +

    Incident Identifier

    - + - + @@ -10039,22 +9972,10 @@

    Incident Suspected Report

    - - - + - - - - + @@ -10063,7 +9984,7 @@

    Incident Suspected Report

    - + @@ -10089,26 +10010,25 @@

    Incident Suspected Report

    - -
    -

    Incident Terminated

    +
    +

    Incident Impact Assessment

    TermIncidentSuspectedReportIncidentIdentifier Prefix risk-owl
    LabelIncident Suspected ReportIncident Identifier
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentSuspectedReport
    - https://w3id.org/dpv/risk#IncidentSuspectedReport + https://w3id.org/dpv/risk/owl/#IncidentIdentifier
    + https://w3id.org/dpv/risk#IncidentIdentifier
    Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the suspicion of an incident in the past or occuringIdentifier associated with an incident
    - + - + @@ -10117,22 +10037,26 @@

    Incident Terminated

    - - @@ -10143,7 +10067,7 @@

    Incident Terminated

    - + @@ -10156,7 +10080,7 @@

    Incident Terminated

    - + @@ -10165,7 +10089,7 @@

    Incident Terminated

    - +
    TermIncidentTerminatedIncidentImpactAssessment Prefix risk-owl
    LabelIncident TerminatedIncident Impact Assessment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IncidentTerminated
    - https://w3id.org/dpv/risk#IncidentTerminated + https://w3id.org/dpv/risk/owl/#IncidentImpactAssessment
    + https://w3id.org/dpv/risk#IncidentImpactAssessment
    Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus
    Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + dpv-owl:ImpactAssessment + → dpv-owl:RiskAssessment + → dpv-owl:Assessment + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasAssessment, + dpv-owl:hasImpactAssessment, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRiskAssessment, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringAn impact assessment associated with a incident
    Date Created2024-02-142024-05-19
    Documented inRisk Incident-statusRisk Incident
    @@ -10173,28 +10097,25 @@

    Incident Terminated

    - - - -
    -

    Indirect Discrimination

    +
    +

    Incident Mitigated

    - + - + @@ -10203,26 +10124,24 @@

    Indirect Discrimination

    - - - - + + + + @@ -10231,7 +10150,7 @@

    Indirect Discrimination

    - + @@ -10244,42 +10163,41 @@

    Indirect Discrimination

    - + - + + + + - +
    TermIndirectDiscriminationIncidentMitigated Prefix risk-owl
    LabelIndirect DiscriminationIncident Mitigated
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IndirectDiscrimination
    - https://w3id.org/dpv/risk#IndirectDiscrimination + https://w3id.org/dpv/risk/owl/#IncidentMitigated
    + https://w3id.org/dpv/risk#IncidentMitigated
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:IncidentStatus
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justifiedThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-09-302024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident-status
    - - - - -
    -

    Individual Health & Safety

    +
    +

    Incident Mitigation Measure

    - + - + @@ -10288,27 +10206,32 @@

    Individual Health & Safety

    - - + + + + - + + + + @@ -10318,12 +10241,15 @@

    Individual Health & Safety

    - + + + + - +
    TermIndividualHealthSafetyIncidentMitigationMeasure Prefix risk-owl
    LabelIndividual Health & SafetyIncident Mitigation Measure
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IndividualHealthSafety
    - https://w3id.org/dpv/risk#IndividualHealthSafety + https://w3id.org/dpv/risk/owl/#IncidentMitigationMeasure
    + https://w3id.org/dpv/risk#IncidentMitigationMeasure
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:IndividualRisk + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure +
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    Date Created2024-05-19
    Documented inRisk Risk-taxonomyRisk Incident
    @@ -10331,27 +10257,25 @@

    Individual Health & Safety

    - - -
    -

    Individual Risk

    +
    +

    Incident Near Miss

    - + - + @@ -10360,16 +10284,24 @@

    Individual Risk

    - + + + - + + + + @@ -10378,7 +10310,7 @@

    Individual Risk

    - + @@ -10389,41 +10321,43 @@

    Individual Risk

    - - + + + + + + + + - +
    TermIndividualRiskIncidentNearMiss Prefix risk-owl
    LabelIndividual RiskIncident Near Miss
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IndividualRisk
    - https://w3id.org/dpv/risk#IndividualRisk + https://w3id.org/dpv/risk/owl/#IncidentNearMiss
    + https://w3id.org/dpv/risk#IncidentNearMiss
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context +
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident-status
    - - - - -
    -

    Informativeness Bias

    +
    +

    Incident Notice

    - + - + @@ -10432,20 +10366,24 @@

    Informativeness Bias

    - - + + + + @@ -10454,32 +10392,26 @@

    Informativeness Bias

    - + - - - - + - + - - - - + - +
    TermInformativenessBiasIncidentNotice Prefix risk-owl
    LabelInformativeness BiasIncident Notice
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#InformativenessBias
    - https://w3id.org/dpv/risk#InformativenessBias + https://w3id.org/dpv/risk/owl/#IncidentNotice
    + https://w3id.org/dpv/risk#IncidentNotice
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:EngineeringDecisionBias + dpv-owl:Notice + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasNotice, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupNotice associated with an Incident
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident
    @@ -10487,28 +10419,25 @@

    Informativeness Bias

    - - - -
    -

    In-Group Bias

    +
    +

    Incident Ongoing

    - + - + @@ -10517,22 +10446,24 @@

    In-Group Bias

    - - + + + + @@ -10541,61 +10472,54 @@

    In-Group Bias

    - + - - - - + - + - + - +
    TermInGroupBiasIncidentOngoing Prefix risk-owl
    LabelIn-Group BiasIncident Ongoing
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#InGroupBias
    - https://w3id.org/dpv/risk#InGroupBias + https://w3id.org/dpv/risk/owl/#IncidentOngoing
    + https://w3id.org/dpv/risk#IncidentOngoing
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept + , risk-owl:IncidentStatus
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsThe incident is ongoing i.e. still active
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident-status
    - - - - -
    -

    Injury

    +
    +

    Incident Ongoing Report

    - + - + @@ -10604,21 +10528,25 @@

    Injury

    - - + + + + @@ -10627,65 +10555,51 @@

    Injury

    - + - - - - + - + - - - - - - - - + + - +
    TermInjuryIncidentOngoingReport Prefix risk-owl
    LabelInjuryIncident Ongoing Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Injury
    - https://w3id.org/dpv/risk#Injury + https://w3id.org/dpv/risk/owl/#IncidentOngoingReport
    + https://w3id.org/dpv/risk#IncidentOngoingReport
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:Harm - → risk-owl:IndividualRisk + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes InjuryA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident
    - - - - - -
    -

    None

    +
    +

    Incident Preliminary Report

    - + - + @@ -10694,31 +10608,35 @@

    None

    - + - + + + + - + + + + @@ -10728,37 +10646,40 @@

    None

    - + + + + - +
    TermIntegrityBreachIncidentPreliminaryReport Prefix risk-owl
    LabelNoneIncident Preliminary Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntegrityBreach
    - https://w3id.org/dpv/risk#IntegrityBreach + https://w3id.org/dpv/risk/owl/#IncidentPreliminaryReport
    + https://w3id.org/dpv/risk#IncidentPreliminaryReport
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:IntegrityConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept -
    risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    Date Created2024-05-19
    Documented inRisk Risk-taxonomyRisk Incident
    -
    -

    Integrity Concept

    +
    +

    Incident Register

    - + - + @@ -10772,11 +10693,19 @@

    Integrity Concept

    - - + + + + @@ -10785,12 +10714,9 @@

    Integrity Concept

    - + - - - - + @@ -10801,7 +10727,7 @@

    Integrity Concept

    - + @@ -10810,32 +10736,32 @@

    Integrity Concept

    - +
    TermIntegrityConceptIncidentRegister Prefix risk-owl
    LabelIntegrity ConceptIncident Register
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntegrityConcept
    - https://w3id.org/dpv/risk#IntegrityConcept + https://w3id.org/dpv/risk/owl/#IncidentRegister
    + https://w3id.org/dpv/risk#IncidentRegister
    Sub-class of dpv-owl:RiskConcept + dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
    DefinitionIndicates a concept is relevant to 'Integrity' in CIA InfoSec modelA register recording incidentes, their reports, notifications, and other related activities
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-292024-05-19
    Documented inRisk CoreRisk Incident
    -
    -

    Integrity Incident

    +
    +

    Incident Report

    - + - + @@ -10849,14 +10775,17 @@

    Integrity Incident

    - - @@ -10867,7 +10796,7 @@

    Integrity Incident

    - + @@ -10893,29 +10822,25 @@

    Integrity Incident

    - - - - -
    -

    Intentional Misuse

    +
    +

    Incident Status

    TermIntegrityIncidentIncidentReport Prefix risk-owl
    LabelIntegrity IncidentIncident Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntegrityIncident
    - https://w3id.org/dpv/risk#IntegrityIncident + https://w3id.org/dpv/risk/owl/#IncidentReport
    + https://w3id.org/dpv/risk#IncidentReport
    Sub-class of risk-owl:Incident - → dpv-owl:RiskConcept + dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of risk-owl:hasIncident + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
    DefinitionIncident where the integrity of information or system has been affectedDocumented information about an incident, its handling, assessments,and notifications
    - + - + @@ -10924,22 +10849,22 @@

    Intentional Misuse

    - - + + + + @@ -10948,10 +10873,14 @@

    Intentional Misuse

    - + + + + @@ -10959,12 +10888,18 @@

    Intentional Misuse

    - - + + + + + + + + - +
    TermIntentionalMisuseIncidentStatus Prefix risk-owl
    LabelIntentional MisuseIncident Status
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#IntentionalMisuse
    - https://w3id.org/dpv/risk#IntentionalMisuse + https://w3id.org/dpv/risk/owl/#IncidentStatus
    + https://w3id.org/dpv/risk#IncidentStatus
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:Misuse - → risk-owl:UserRisks - → dpv-owl:RiskConcept + dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionIntentional MisuseStatus associated with an incident
    Examples Using DPV and RISK extension to represent incidents (E0069) +
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyDex Incident-status
    @@ -10972,29 +10907,25 @@

    Intentional Misuse

    - - - - -
    -

    Intercept Communications

    +
    +

    Incident Status Unknown

    - + - + @@ -11003,23 +10934,24 @@

    Intercept Communications

    - - + + + + @@ -11028,38 +10960,29 @@

    Intercept Communications

    - + - - - - + - - - - + - + - - - - + - +
    TermInterceptCommunicationsIncidentStatusUnknown Prefix risk-owl
    LabelIntercept CommunicationsIncident Status Unknown
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#InterceptCommunications
    - https://w3id.org/dpv/risk#InterceptCommunications + https://w3id.org/dpv/risk/owl/#IncidentStatusUnknown
    + https://w3id.org/dpv/risk#IncidentStatusUnknown
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , risk-owl:IncidentStatus
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionSomething that acts as or causes Interception of CommunicationsThe status of a incident is unknown
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident-status
    @@ -11067,32 +10990,25 @@

    Intercept Communications

    - - - - - - - -
    -

    Judicial Costs

    +
    +

    Incident Suspected

    - + - + @@ -11101,22 +11017,24 @@

    Judicial Costs

    - - + + + + @@ -11125,7 +11043,7 @@

    Judicial Costs

    - + @@ -11136,41 +11054,43 @@

    Judicial Costs

    - - + + + + + + + + - +
    TermJudicialCostsIncidentSuspected Prefix risk-owl
    LabelJudicial CostsIncident Suspected
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#JudicialCosts
    - https://w3id.org/dpv/risk#JudicialCosts + https://w3id.org/dpv/risk/owl/#IncidentSuspected
    + https://w3id.org/dpv/risk#IncidentSuspected
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:IncidentStatus
    Sub-class of risk-owl:FinancialLoss - → risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionSomething that involves or causes judicial costs to be paidThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident-status
    - - - - -
    -

    Judicial Penalty

    +
    +

    Incident Suspected Report

    - + - + @@ -11179,22 +11099,25 @@

    Judicial Penalty

    - - + + + + @@ -11203,7 +11126,7 @@

    Judicial Penalty

    - + @@ -11214,12 +11137,15 @@

    Judicial Penalty

    - + + + + - +
    TermJudicialPenaltyIncidentSuspectedReport Prefix risk-owl
    LabelJudicial PenaltyIncident Suspected Report
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#JudicialPenalty
    - https://w3id.org/dpv/risk#JudicialPenalty + https://w3id.org/dpv/risk/owl/#IncidentSuspectedReport
    + https://w3id.org/dpv/risk#IncidentSuspectedReport
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:FinancialLoss - → risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that involves or causes judicial penalties to be paidA report describing the suspicion of an incident in the past or occuring
    Date Created2024-05-19
    Documented inRisk Risk-taxonomyRisk Incident
    @@ -11227,28 +11153,25 @@

    Judicial Penalty

    - - - -
    -

    Language Discrimination

    +
    +

    Incident Terminated

    - + - + @@ -11257,26 +11180,24 @@

    Language Discrimination

    - - - - + + + + @@ -11285,7 +11206,7 @@

    Language Discrimination

    - + @@ -11298,13 +11219,16 @@

    Language Discrimination

    - + - + + + + - +
    TermLanguageDiscriminationIncidentTerminated Prefix risk-owl
    LabelLanguage DiscriminationIncident Terminated
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LanguageDiscrimination
    - https://w3id.org/dpv/risk#LanguageDiscrimination + https://w3id.org/dpv/risk/owl/#IncidentTerminated
    + https://w3id.org/dpv/risk#IncidentTerminated
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:IncidentStatus
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
    in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
    DefinitionDiscrimination based on a person's language, often linked to national origin or ethnicityThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    Date Created2024-09-302024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Incident-status
    @@ -11314,25 +11238,26 @@

    Language Discrimination

    -
    -

    Legal Risk

    + +
    +

    Indirect Discrimination

    - + - + @@ -11341,15 +11266,18 @@

    Legal Risk

    - @@ -11362,7 +11290,7 @@

    Legal Risk

    - + @@ -11373,7 +11301,10 @@

    Legal Risk

    - + + + + @@ -11389,25 +11320,25 @@

    Legal Risk

    -
    -

    Lose of Credibility

    +
    +

    Individual Health & Safety

    TermLegalRiskIndirectDiscrimination Prefix risk-owl
    LabelLegal RiskIndirect Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LegalRisk
    - https://w3id.org/dpv/risk#LegalRisk + https://w3id.org/dpv/risk/owl/#IndirectDiscrimination
    + https://w3id.org/dpv/risk#IndirectDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of dpv-owl:RiskConcept + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-09-30
    - + - + @@ -11425,7 +11356,8 @@

    Lose of Credibility

    - @@ -11437,34 +11369,19 @@

    Lose of Credibility

    - - - - + - - - - + - - - - - - - - - - - - + + + @@ -11478,25 +11395,25 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    +
    +

    Individual Risk

    TermLoseCredibilityIndividualHealthSafety Prefix risk-owl
    LabelLose of CredibilityIndividual Health & Safety
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseCredibility
    - https://w3id.org/dpv/risk#LoseCredibility + https://w3id.org/dpv/risk/owl/#IndividualHealthSafety
    + https://w3id.org/dpv/risk#IndividualHealthSafety
    Sub-class of risk-owl:ReputationalRisk + risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -11514,7 +11431,7 @@

    Lose of Customer Confidence

    - @@ -11528,32 +11445,20 @@

    Lose of Customer Confidence

    - + - - - - + - - - - - - - - - - - - + + + @@ -11567,25 +11472,25 @@

    Lose of Customer Confidence

    -
    -

    Lose of Goodwill

    +
    +

    Informativeness Bias

    TermLoseCustomerConfidenceIndividualRisk Prefix risk-owl
    LabelLose of Customer ConfidenceIndividual Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseCustomerConfidence
    - https://w3id.org/dpv/risk#LoseCustomerConfidence + https://w3id.org/dpv/risk/owl/#IndividualRisk
    + https://w3id.org/dpv/risk#IndividualRisk
    Sub-class of risk-owl:ReputationalRisk + risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Loss of Customer ConfidenceRisks and issues that affect or have the potential to affect specific individuals
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -11594,17 +11499,16 @@

    Lose of Goodwill

    - @@ -11617,7 +11521,7 @@

    Lose of Goodwill

    - + @@ -11626,22 +11530,19 @@

    Lose of Goodwill

    - + - + - - - - + - + @@ -11656,25 +11557,25 @@

    Lose of Goodwill

    -
    -

    Lose of Negotiating Capacity

    +
    +

    In-Group Bias

    TermLoseGoodwillInformativenessBias Prefix risk-owl
    LabelLose of GoodwillInformativeness Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseGoodwill
    - https://w3id.org/dpv/risk#LoseGoodwill + https://w3id.org/dpv/risk/owl/#InformativenessBias
    + https://w3id.org/dpv/risk#InformativenessBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:ReputationalRisk - → dpv-owl:RiskConcept + risk-owl:EngineeringDecisionBias
    DefinitionSomething that acts as or causes Loss of GoodwillBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in
    - + - + @@ -11683,16 +11584,18 @@

    Lose of Negotiating Capacity

    - @@ -11706,7 +11609,7 @@

    Lose of Negotiating Capacity

    - + @@ -11715,22 +11618,19 @@

    Lose of Negotiating Capacity

    - + - + - - - - + - + @@ -11745,25 +11645,25 @@

    Lose of Negotiating Capacity

    -
    -

    Lose of Opportunity

    +
    +

    Injury

    TermLoseNegotiatingCapacityInGroupBias Prefix risk-owl
    LabelLose of Negotiating CapacityIn-Group Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseNegotiatingCapacity
    - https://w3id.org/dpv/risk#LoseNegotiatingCapacity + https://w3id.org/dpv/risk/owl/#InGroupBias
    + https://w3id.org/dpv/risk#InGroupBias
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:ReputationalRisk + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityBias that occurs when showing partiality to one's own group or own characteristics
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in
    - + - + @@ -11781,7 +11681,9 @@

    Lose of Opportunity

    - @@ -11795,7 +11697,7 @@

    Lose of Opportunity

    - + @@ -11834,25 +11736,26 @@

    Lose of Opportunity

    -
    -

    Lose of Reputation

    + +
    +

    None

    TermLoseOpportunityInjury Prefix risk-owl
    LabelLose of OpportunityInjury
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseOpportunity
    - https://w3id.org/dpv/risk#LoseOpportunity + https://w3id.org/dpv/risk/owl/#Injury
    + https://w3id.org/dpv/risk#Injury
    Sub-class of risk-owl:ReputationalRisk + risk-owl:Harm + → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Loss of OpportunityConcept representing Injury
    - + - + @@ -11862,15 +11765,19 @@

    Lose of Reputation

    - @@ -11882,34 +11789,19 @@

    Lose of Reputation

    - - - - + - - - - + - - - - - - - - - - - - + + + @@ -11919,29 +11811,25 @@

    Lose of Reputation

    - - - - -
    -

    Lose of Trust

    +
    +

    Integrity Concept

    TermLoseReputationIntegrityBreach Prefix risk-owl
    LabelLose of ReputationNone
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseReputation
    - https://w3id.org/dpv/risk#LoseReputation + https://w3id.org/dpv/risk/owl/#IntegrityBreach
    + https://w3id.org/dpv/risk#IntegrityBreach
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:IntegrityConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ReputationalRisk + risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -11950,17 +11838,12 @@

    Lose of Trust

    - @@ -11973,61 +11856,57 @@

    Lose of Trust

    - + - + + + + - - - - + - + - - - - + - +
    TermLoseTrustIntegrityConcept Prefix risk-owl
    LabelLose of TrustIntegrity Concept
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LoseTrust
    - https://w3id.org/dpv/risk#LoseTrust + https://w3id.org/dpv/risk/owl/#IntegrityConcept
    + https://w3id.org/dpv/risk#IntegrityConcept
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:ReputationalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Loss of TrustIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    - -
    -

    Low Likelihood

    +
    +

    Integrity Incident

    - + - + @@ -12036,28 +11915,19 @@

    Low Likelihood

    - - - - - - @@ -12068,12 +11938,9 @@

    Low Likelihood

    - + - - - - + @@ -12084,16 +11951,13 @@

    Low Likelihood

    - + - - - - + - +
    TermLowLikelihoodIntegrityIncident Prefix risk-owl
    LabelLow LikelihoodIntegrity Incident
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LowLikelihood
    - https://w3id.org/dpv/risk#LowLikelihood + https://w3id.org/dpv/risk/owl/#IntegrityIncident
    + https://w3id.org/dpv/risk#IntegrityIncident
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood
    Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:Incident + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood + risk-owl:hasIncident
    DefinitionLevel where Likelihood is LowIncident where the integrity of information or system has been affected
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Incident
    @@ -12101,25 +11965,28 @@

    Low Likelihood

    -
    -

    Low Risk

    + + + +
    +

    Intentional Misuse

    - + - + @@ -12128,30 +11995,23 @@

    Low Risk

    - - - - - - - - - + @@ -12160,12 +12020,9 @@

    Low Risk

    - + - - - - + @@ -12174,18 +12031,12 @@

    Low Risk

    - - - - + + - - - - - +
    TermLowRiskIntentionalMisuse Prefix risk-owl
    LabelLow RiskIntentional Misuse
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LowRisk
    - https://w3id.org/dpv/risk#LowRisk + https://w3id.org/dpv/risk/owl/#IntentionalMisuse
    + https://w3id.org/dpv/risk#IntentionalMisuse
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:Misuse + → risk-owl:UserRisks + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is LowConcept represent an intentional misuse (of something)
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -12193,25 +12044,29 @@

    Low Risk

    -
    -

    Low Severity

    + + + + +
    +

    Intercept Communications

    - + - + @@ -12220,30 +12075,24 @@

    Low Severity

    - - - - - - - - - + @@ -12252,32 +12101,38 @@

    Low Severity

    - + - + - + + + + - + - + + + + - +
    TermLowSeverityInterceptCommunications Prefix risk-owl
    LabelLow SeverityIntercept Communications
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#LowSeverity
    - https://w3id.org/dpv/risk#LowSeverity + https://w3id.org/dpv/risk/owl/#InterceptCommunications
    + https://w3id.org/dpv/risk#InterceptCommunications
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is LowConcept representing Interception of Communications
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1This concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -12288,25 +12143,29 @@

    Low Severity

    -
    -

    Malicious Activity

    + + + + +
    +

    Judicial Costs

    - + - + @@ -12317,14 +12176,16 @@

    Malicious Activity

    , owl:Class , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - @@ -12338,7 +12199,7 @@

    Malicious Activity

    - + @@ -12365,27 +12226,25 @@

    Malicious Activity

    - - -
    -

    Malicious Code Attack

    +
    +

    Judicial Penalty

    TermMaliciousActivityJudicialCosts Prefix risk-owl
    LabelMalicious ActivityJudicial Costs
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MaliciousActivity
    - https://w3id.org/dpv/risk#MaliciousActivity + https://w3id.org/dpv/risk/owl/#JudicialCosts
    + https://w3id.org/dpv/risk#JudicialCosts
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:FinancialLoss + → risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to othersSomething that involves or causes judicial costs to be paid
    - + - + @@ -12395,18 +12254,17 @@

    Malicious Code Attack

    - @@ -12420,32 +12278,20 @@

    Malicious Code Attack

    - + - - - - + - - - - - - - - - - - - + + + @@ -12459,27 +12305,25 @@

    Malicious Code Attack

    - - -
    -

    Malware Attack

    +
    +

    Language Discrimination

    TermMaliciousCodeAttackJudicialPenalty Prefix risk-owl
    LabelMalicious Code AttackJudicial Penalty
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
    - https://w3id.org/dpv/risk#MaliciousCodeAttack + https://w3id.org/dpv/risk/owl/#JudicialPenalty
    + https://w3id.org/dpv/risk#JudicialPenalty
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:ConfidentialityConcept - , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:SecurityAttack - → risk-owl:ExternalSecurityThreat + risk-owl:FinancialLoss + → risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Malicious Code AttackSomething that involves or causes judicial penalties to be paid
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -12488,19 +12332,17 @@

    Malware Attack

    - @@ -12514,32 +12356,23 @@

    Malware Attack

    - + - - - - + - + - - - - - - - - + + @@ -12552,26 +12385,25 @@

    Malware Attack

    - -
    -

    Material Damage

    +
    +

    Legal Compliance Risk

    TermMalwareAttackLanguageDiscrimination Prefix risk-owl
    LabelMalware AttackLanguage Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MalwareAttack
    - https://w3id.org/dpv/risk#MalwareAttack + https://w3id.org/dpv/risk/owl/#LanguageDiscrimination
    + https://w3id.org/dpv/risk#LanguageDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:ConfidentialityConcept - , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:SecurityAttack - → risk-owl:ExternalSecurityThreat + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Malware AttackDiscrimination based on a person's language, often linked to national origin or ethnicity
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -12582,14 +12414,13 @@

    Material Damage

    , owl:Class , dpv-owl:RiskConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk - @@ -12603,12 +12434,9 @@

    Material Damage

    - + - - - - + @@ -12617,18 +12445,9 @@

    Material Damage

    - - - - - - - - - - - - + + + @@ -12642,25 +12461,25 @@

    Material Damage

    -
    -

    Misandry

    +
    +

    Legally Relevant Consequence

    TermMaterialDamageLegalComplianceRisk Prefix risk-owl
    LabelMaterial DamageLegal Compliance Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MaterialDamage
    - https://w3id.org/dpv/risk#MaterialDamage + https://w3id.org/dpv/risk/owl/#LegalComplianceRisk
    + https://w3id.org/dpv/risk#LegalComplianceRisk
    Sub-class of risk-owl:LegalRisk + risk-owl:LegalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Material DamageRisks and consequences regarding legal compliance and its violation
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -12669,23 +12488,16 @@

    Misandry

    - - - @@ -12699,7 +12511,7 @@

    Misandry

    - + @@ -12710,10 +12522,7 @@

    Misandry

    - - - - + @@ -12729,25 +12538,26 @@

    Misandry

    -
    -

    Misogyny

    + +
    +

    Legal Risk Concept

    TermMisandryLegallyRelevantConsequence Prefix risk-owl
    LabelMisandryLegally Relevant Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Misandry
    - https://w3id.org/dpv/risk#Misandry + https://w3id.org/dpv/risk/owl/#LegallyRelevantConsequence
    + https://w3id.org/dpv/risk#LegallyRelevantConsequence
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:SocietalRisk + risk-owl:LegalRiskConcept → dpv-owl:RiskConcept
    DefinitionDislike, contempt, or prejudice against menA consequence that is legally relevant i.e. actionable under law
    Date Created2024-09-30
    - + - + @@ -12756,24 +12566,17 @@

    Misogyny

    - - - @@ -12786,9 +12589,12 @@

    Misogyny

    - + - + + + + @@ -12799,7 +12605,7 @@

    Misogyny

    - + @@ -12816,25 +12622,25 @@

    Misogyny

    -
    -

    Misuse

    +
    +

    Legal Support Limited

    TermMisogynyLegalRiskConcept Prefix risk-owl
    LabelMisogynyLegal Risk Concept
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Misogyny
    - https://w3id.org/dpv/risk#Misogyny + https://w3id.org/dpv/risk/owl/#LegalRiskConcept
    + https://w3id.org/dpv/risk#LegalRiskConcept
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionDislike, contempt, or prejudice against womenRisk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process
    Usage NoteLegal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation
    Date Created2024-09-302024-10-21
    - + - + @@ -12845,14 +12651,15 @@

    Misuse

    , owl:Class , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - @@ -12866,7 +12673,7 @@

    Misuse

    - + @@ -12879,7 +12686,91 @@

    Misuse

    - + + + + + + + + + +
    TermMisuseLegalSupportLimited Prefix risk-owl
    LabelMisuseLegal Support Limited
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Misuse
    - https://w3id.org/dpv/risk#Misuse + https://w3id.org/dpv/risk/owl/#LegalSupportLimited
    + https://w3id.org/dpv/risk#LegalSupportLimited
    Sub-class of risk-owl:UserRisks + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes MisuseStub
    Date Created2024-06-112024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Lose of Credibility

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -12887,7 +12778,7 @@

    Misuse

    - + @@ -12899,25 +12790,28 @@

    Misuse

    -
    -

    Moderate Likelihood

    + + + +
    +

    Lose of Customer Confidence

    TermLoseCredibilityPrefixrisk-owl
    LabelLose of Credibility
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#LoseCredibility
    + https://w3id.org/dpv/risk#LoseCredibility +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified
    ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
    Documented in
    - + - + @@ -12926,30 +12820,22 @@

    Moderate Likelihood

    - - - - - - - - - + @@ -12958,32 +12844,35 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + + + + - +
    TermModerateLikelihoodLoseCustomerConfidence Prefix risk-owl
    LabelModerate LikelihoodLose of Customer Confidence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ModerateLikelihood
    - https://w3id.org/dpv/risk#ModerateLikelihood + https://w3id.org/dpv/risk/owl/#LoseCustomerConfidence
    + https://w3id.org/dpv/risk#LoseCustomerConfidence
    Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
    Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateConcept representing Loss of Customer Confidence
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -12991,25 +12880,28 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + + +
    +

    Lose of Goodwill

    - + - + @@ -13018,30 +12910,22 @@

    Moderate Risk

    - - - - - - - - - + @@ -13050,32 +12934,35 @@

    Moderate Risk

    - + - - - - + - + + + + - + - + + + + - +
    TermModerateRiskLoseGoodwill Prefix risk-owl
    LabelModerate RiskLose of Goodwill
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ModerateRisk
    - https://w3id.org/dpv/risk#ModerateRisk + https://w3id.org/dpv/risk/owl/#LoseGoodwill
    + https://w3id.org/dpv/risk#LoseGoodwill
    Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
    Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasRiskLevel -
    DefinitionLevel where Risk is ModerateConcept representing Loss of Goodwill
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -13083,25 +12970,28 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + +
    +

    Lose of Negotiating Capacity

    - + - + @@ -13110,30 +13000,22 @@

    Moderate Severity

    - - - - - - - - - + @@ -13142,32 +13024,35 @@

    Moderate Severity

    - + - - - - + - + + + + - + - + + + + - +
    TermModerateSeverityLoseNegotiatingCapacity Prefix risk-owl
    LabelModerate SeverityLose of Negotiating Capacity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ModerateSeverity
    - https://w3id.org/dpv/risk#ModerateSeverity + https://w3id.org/dpv/risk/owl/#LoseNegotiatingCapacity
    + https://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
    Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasSeverity -
    DefinitionLevel where Severity is ModerateConcept representing Loss of Negotiating Capacity
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-levelsRisk Risk-taxonomy
    @@ -13175,25 +13060,28 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    + + + +
    +

    Lose of Opportunity

    - + - + @@ -13202,26 +13090,22 @@

    Monitor Consequence

    - - - - - + @@ -13230,29 +13114,35 @@

    Monitor Consequence

    - + - + + + + - + - + + + + - +
    TermMonitorConsequenceLoseOpportunity Prefix risk-owl
    LabelMonitor ConsequenceLose of Opportunity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorConsequence
    - https://w3id.org/dpv/risk#MonitorConsequence + https://w3id.org/dpv/risk/owl/#LoseOpportunity
    + https://w3id.org/dpv/risk#LoseOpportunity
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a Risk ConsequenceConcept representing Loss of Opportunity
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13260,25 +13150,28 @@

    Monitor Consequence

    -
    -

    Monitor Control

    + + + +
    +

    Lose of Reputation

    - + - + @@ -13287,25 +13180,22 @@

    Monitor Control

    - - - - - + @@ -13314,32 +13204,35 @@

    Monitor Control

    - + - - - - + - + + + + - + - + + + + - +
    TermMonitorControlLoseReputation Prefix risk-owl
    LabelMonitor ControlLose of Reputation
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorControl
    - https://w3id.org/dpv/risk#MonitorControl + https://w3id.org/dpv/risk/owl/#LoseReputation
    + https://w3id.org/dpv/risk#LoseReputation
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsConcept representing Loss of Reputation
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13347,25 +13240,28 @@

    Monitor Control

    -
    -

    Monitor Impact

    + + + +
    +

    Lose of Trust

    - + - + @@ -13374,26 +13270,22 @@

    Monitor Impact

    - - - - - + @@ -13402,29 +13294,35 @@

    Monitor Impact

    - + - + + + + - + - + + + + - +
    TermMonitorImpactLoseTrust Prefix risk-owl
    LabelMonitor ImpactLose of Trust
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorImpact
    - https://w3id.org/dpv/risk#MonitorImpact + https://w3id.org/dpv/risk/owl/#LoseTrust
    + https://w3id.org/dpv/risk#LoseTrust
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ReputationalRisk + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a Risk ImpactConcept representing Loss of Trust
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13432,25 +13330,25 @@

    Monitor Impact

    -
    -

    Monitor Risk

    +
    +

    Low Likelihood

    - + - + @@ -13459,24 +13357,28 @@

    Monitor Risk

    - + + + + - @@ -13487,9 +13389,12 @@

    Monitor Risk

    - + - + + + + @@ -13500,7 +13405,7 @@

    Monitor Risk

    - + @@ -13509,7 +13414,7 @@

    Monitor Risk

    - +
    TermMonitorRiskLowLikelihood Prefix risk-owl
    LabelMonitor RiskLow Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorRisk
    - https://w3id.org/dpv/risk#MonitorRisk + https://w3id.org/dpv/risk/owl/#LowLikelihood
    + https://w3id.org/dpv/risk#LowLikelihood
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:Likelihood
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasLikelihood
    DefinitionControl that monitors a RiskLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    Documented inRisk Risk-controlsRisk Risk-levels
    @@ -13517,25 +13422,25 @@

    Monitor Risk

    -
    -

    Monitor Control

    +
    +

    Low Risk

    - + - + @@ -13544,24 +13449,28 @@

    Monitor Control

    - + + + + - @@ -13572,9 +13481,12 @@

    Monitor Control

    - + - + + + + @@ -13585,7 +13497,7 @@

    Monitor Control

    - + @@ -13594,7 +13506,7 @@

    Monitor Control

    - +
    TermMonitorRiskControlLowRisk Prefix risk-owl
    LabelMonitor ControlLow Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorRiskControl
    - https://w3id.org/dpv/risk#MonitorRiskControl + https://w3id.org/dpv/risk/owl/#LowRisk
    + https://w3id.org/dpv/risk#LowRisk
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskLevel
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasRiskLevel
    DefinitionControl that monitors another ControlLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    Documented inRisk Risk-controlsRisk Risk-levels
    @@ -13602,25 +13514,2804 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    +
    +

    Low Severity

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermLowSeverityPrefixrisk-owl
    LabelLow Severity
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#LowSeverity
    + https://w3id.org/dpv/risk#LowSeverity +
    Type rdfs:Class + , owl:Class + , dpv-owl:Severity +
    Sub-class of risk-owl:3SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity +
    in Range of dpv-owl:hasSeverity +
    DefinitionLevel where Severity is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    +
    + + + + + + +
    +

    Loyalty Program Exclusion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermLoyaltyProgramExclusionPrefixrisk-owl
    LabelLoyalty Program Exclusion
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#LoyaltyProgramExclusion
    + https://w3id.org/dpv/risk#LoyaltyProgramExclusion +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Malicious Activity

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMaliciousActivityPrefixrisk-owl
    LabelMalicious Activity
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MaliciousActivity
    + https://w3id.org/dpv/risk#MaliciousActivity +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    Documented inRisk Risk-taxonomy
    +
    + + + + + + + + +
    +

    Malicious Code Attack

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMaliciousCodeAttackPrefixrisk-owl
    LabelMalicious Code Attack
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
    + https://w3id.org/dpv/risk#MaliciousCodeAttack +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + + + +
    +

    Malware Attack

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMalwareAttackPrefixrisk-owl
    LabelMalware Attack
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MalwareAttack
    + https://w3id.org/dpv/risk#MalwareAttack +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:SecurityAttack + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Material Damage

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMaterialDamagePrefixrisk-owl
    LabelMaterial Damage
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MaterialDamage
    + https://w3id.org/dpv/risk#MaterialDamage +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:LegallyRelevantConsequence + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Misandry

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMisandryPrefixrisk-owl
    LabelMisandry
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Misandry
    + https://w3id.org/dpv/risk#Misandry +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionDislike, contempt, or prejudice against men
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Misogyny

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMisogynyPrefixrisk-owl
    LabelMisogyny
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Misogyny
    + https://w3id.org/dpv/risk#Misogyny +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Sexism + → risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionDislike, contempt, or prejudice against women
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMisusePrefixrisk-owl
    LabelMisuse
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Misuse
    + https://w3id.org/dpv/risk#Misuse +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:UserRisks + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing a misuse (of something)
    Date Created2024-06-11
    Date Modified2024-08-16
    ContributorsDelaram Golpayegani
    Documented inRisk Risk-taxonomy
    +
    + + + +
    +

    Moderate Likelihood

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermModerateLikelihoodPrefixrisk-owl
    LabelModerate Likelihood
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ModerateLikelihood
    + https://w3id.org/dpv/risk#ModerateLikelihood +
    Type rdfs:Class + , owl:Class + , dpv-owl:Likelihood +
    Sub-class of risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
    Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood +
    in Range of dpv-owl:hasLikelihood +
    DefinitionLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    +
    + + + +
    +

    Moderate Risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermModerateRiskPrefixrisk-owl
    LabelModerate Risk
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ModerateRisk
    + https://w3id.org/dpv/risk#ModerateRisk +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskLevel +
    Sub-class of risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
    Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel +
    in Range of dpv-owl:hasRiskLevel +
    DefinitionLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    +
    + + + +
    +

    Moderate Severity

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermModerateSeverityPrefixrisk-owl
    LabelModerate Severity
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ModerateSeverity
    + https://w3id.org/dpv/risk#ModerateSeverity +
    Type rdfs:Class + , owl:Class + , dpv-owl:Severity +
    Sub-class of risk-owl:3SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
    Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity +
    in Range of dpv-owl:hasSeverity +
    DefinitionLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-levels
    +
    + + + +
    +

    Monitor Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorConsequencePrefixrisk-owl
    LabelMonitor Consequence
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorConsequence
    + https://w3id.org/dpv/risk#MonitorConsequence +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that monitors a Risk Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + +
    +

    Monitor Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorControlPrefixrisk-owl
    LabelMonitor Control
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorControl
    + https://w3id.org/dpv/risk#MonitorControl +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionRisk Mitigation Measure that uses controls to monitor events
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + +
    +

    Monitor Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorImpactPrefixrisk-owl
    LabelMonitor Impact
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorImpact
    + https://w3id.org/dpv/risk#MonitorImpact +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that monitors a Risk Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + +
    +

    Monitor Risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorRiskPrefixrisk-owl
    LabelMonitor Risk
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorRisk
    + https://w3id.org/dpv/risk#MonitorRisk +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that monitors a Risk
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + +
    +

    Monitor Control

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorRiskControlPrefixrisk-owl
    LabelMonitor Control
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorRiskControl
    + https://w3id.org/dpv/risk#MonitorRiskControl +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that monitors another Control
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + +
    +

    Monitor Risk Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorRiskSourcePrefixrisk-owl
    LabelMonitor Risk Source
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorRiskSource
    + https://w3id.org/dpv/risk#MonitorRiskSource +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that monitors a Risk Source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + +
    +

    Monitor Vulnerabilities

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermMonitorVulnerabilitiesPrefixrisk-owl
    LabelMonitor Vulnerabilities
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#MonitorVulnerabilities
    + https://w3id.org/dpv/risk#MonitorVulnerabilities +
    Type rdfs:Class + , owl:Class + , risk-owl:RiskControl +
    Sub-class of risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl that monitors a Risk Vulnerability
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controls
    +
    + + + + + + +
    +

    Nationality Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermNationalityDiscriminationPrefixrisk-owl
    LabelNationality Discrimination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#NationalityDiscrimination
    + https://w3id.org/dpv/risk#NationalityDiscrimination +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept +
    Sub-class of risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionDiscrimination based on a person's nationality or citizenship
    Date Created2024-09-30
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Non-Material Damage

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermNonMaterialDamagePrefixrisk-owl
    LabelNon-Material Damage
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#NonMaterialDamage
    + https://w3id.org/dpv/risk#NonMaterialDamage +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:LegallyRelevantConsequence + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Non-Normality Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermNonNormalityBiasPrefixrisk-owl
    LabelNon-Normality Bias
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#NonNormalityBias
    + https://w3id.org/dpv/risk#NonNormalityBias +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept +
    Sub-class of risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Non-Response Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermNonResponseBiasPrefixrisk-owl
    LabelNon-Response Bias
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#NonResponseBias
    + https://w3id.org/dpv/risk#NonResponseBias +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept +
    Sub-class of risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + +
    +

    Operational Security Risk

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermOperationalSecurityRiskPrefixrisk-owl
    LabelOperational Security Risk
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#OperationalSecurityRisk
    + https://w3id.org/dpv/risk#OperationalSecurityRisk +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionRisks and issues that arise during operational processes
    Documented inRisk Risk-taxonomy
    +
    + + + + + + + +
    +

    Organisational Risk Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermOrganisationalRiskConceptPrefixrisk-owl
    LabelOrganisational Risk Concept
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#OrganisationalRiskConcept
    + https://w3id.org/dpv/risk#OrganisationalRiskConcept +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of dpv-owl:RiskConcept +
    DefinitionRisk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process
    Usage NoteOrganisational in this context refers to an organisation which is not human but is managed by humans
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Out-Group Homogeneity Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermOutGroupHomogeneityBiasPrefixrisk-owl
    LabelOut-Group Homogeneity Bias
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#OutGroupHomogeneityBias
    + https://w3id.org/dpv/risk#OutGroupHomogeneityBias +
    Type rdfs:Class + , owl:Class + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept +
    Sub-class of risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Payment

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermPaymentPrefixrisk-owl
    LabelPayment
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#Payment
    + https://w3id.org/dpv/risk#Payment +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:Renumeration + → risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Personalisation Disabled

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermPersonalisationDisabledPrefixrisk-owl
    LabelPersonalisation Disabled
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#PersonalisationDisabled
    + https://w3id.org/dpv/risk#PersonalisationDisabled +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Personalisation Enabled

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermPersonalisationEnabledPrefixrisk-owl
    LabelPersonalisation Enabled
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#PersonalisationEnabled
    + https://w3id.org/dpv/risk#PersonalisationEnabled +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Personal Safety Endangerment

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermPersonalSafetyEndangermentPrefixrisk-owl
    LabelPersonal Safety Endangerment
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#PersonalSafetyEndangerment
    + https://w3id.org/dpv/risk#PersonalSafetyEndangerment +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + + +
    +

    Phishing Scam

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermPhishingScamPrefixrisk-owl
    LabelPhishing Scam
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#PhishingScam
    + https://w3id.org/dpv/risk#PhishingScam +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Physical Assault

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermPhysicalAssaultPrefixrisk-owl
    LabelPhysical Assault
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#PhysicalAssault
    + https://w3id.org/dpv/risk#PhysicalAssault +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:Harm + → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + +
    +

    Physical Harm

    - + - + @@ -13629,36 +16320,30 @@

    Monitor Risk Source

    - - - - - + - - - - + @@ -13668,18 +16353,12 @@

    Monitor Risk Source

    - - - - + + - - - - - +
    TermMonitorRiskSourcePhysicalHarm Prefix risk-owl
    LabelMonitor Risk SourcePhysical Harm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorRiskSource
    - https://w3id.org/dpv/risk#MonitorRiskSource + https://w3id.org/dpv/risk/owl/#PhysicalHarm
    + https://w3id.org/dpv/risk#PhysicalHarm
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Harm + → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a Risk Source
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -13687,25 +16366,27 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + +
    +

    Policy Risk

    - + - + @@ -13714,26 +16395,20 @@

    Monitor Vulnerabilities

    - - - - - + @@ -13742,7 +16417,7 @@

    Monitor Vulnerabilities

    - + @@ -13753,47 +16428,37 @@

    Monitor Vulnerabilities

    - - - - + + - - - - - +
    TermMonitorVulnerabilitiesPolicyRisk Prefix risk-owl
    LabelMonitor VulnerabilitiesPolicy Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#MonitorVulnerabilities
    - https://w3id.org/dpv/risk#MonitorVulnerabilities + https://w3id.org/dpv/risk/owl/#PolicyRisk
    + https://w3id.org/dpv/risk#PolicyRisk
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk
    Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityRisks and consequences regarding policy and its associated processes
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    - - - - -
    -

    Nationality Discrimination

    +
    +

    Potential Consequence

    - + - + @@ -13802,22 +16467,12 @@

    Nationality Discrimination

    - - - @@ -13830,9 +16485,12 @@

    Nationality Discrimination

    - + - + + + + @@ -13843,42 +16501,41 @@

    Nationality Discrimination

    - + - + + + + - +
    TermNationalityDiscriminationPotentialConsequence Prefix risk-owl
    LabelNationality DiscriminationPotential Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#NationalityDiscrimination
    - https://w3id.org/dpv/risk#NationalityDiscrimination + https://w3id.org/dpv/risk/owl/#PotentialConsequence
    + https://w3id.org/dpv/risk#PotentialConsequence
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionDiscrimination based on a person's nationality or citizenshipIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-302024-09-29
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    - - - - -
    -

    Non-Material Damage

    +
    +

    Potential Impact

    - + - + @@ -13887,17 +16544,12 @@

    Non-Material Damage

    - @@ -13910,11 +16562,11 @@

    Non-Material Damage

    - + - + @@ -13926,48 +16578,41 @@

    Non-Material Damage

    - + - - - - + - +
    TermNonMaterialDamagePotentialImpact Prefix risk-owl
    LabelNon-Material DamagePotential Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#NonMaterialDamage
    - https://w3id.org/dpv/risk#NonMaterialDamage + https://w3id.org/dpv/risk/owl/#PotentialImpact
    + https://w3id.org/dpv/risk#PotentialImpact
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and normsPotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2022-03-302024-09-29
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    - - - - -
    -

    Non-Normality Bias

    +
    +

    Potential Risk

    - + - + @@ -13976,19 +16621,12 @@

    Non-Normality Bias

    - @@ -14001,61 +16639,57 @@

    Non-Normality Bias

    - + - + + + + - - - - + - + - + - +
    TermNonNormalityBiasPotentialRisk Prefix risk-owl
    LabelNon-Normality BiasPotential Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#NonNormalityBias
    - https://w3id.org/dpv/risk#NonNormalityBias + https://w3id.org/dpv/risk/owl/#PotentialRisk
    + https://w3id.org/dpv/risk#PotentialRisk
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    - - - - -
    -

    Non-Response Bias

    +
    +

    Potential RiskSource

    - + - + @@ -14064,20 +16698,12 @@

    Non-Response Bias

    - @@ -14090,32 +16716,32 @@

    Non-Response Bias

    - + - + + + + - - - - + - + - + - +
    TermNonResponseBiasPotentialRiskSource Prefix risk-owl
    LabelNon-Response BiasPotential RiskSource
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#NonResponseBias
    - https://w3id.org/dpv/risk#NonResponseBias + https://w3id.org/dpv/risk/owl/#PotentialRiskSource
    + https://w3id.org/dpv/risk#PotentialRiskSource
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:SelectionBias - → risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    @@ -14125,25 +16751,26 @@

    Non-Response Bias

    -
    -

    Operational Security Risk

    + +
    +

    Privacy

    - + - + @@ -14153,14 +16780,17 @@

    Operational Security Risk

    - @@ -14171,10 +16801,7 @@

    Operational Security Risk

    - - - - + @@ -14200,25 +16827,25 @@

    Operational Security Risk

    -
    -

    Out-Group Homogeneity Bias

    +
    +

    Psychological Harm

    TermOperationalSecurityRiskPrivacy Prefix risk-owl
    LabelOperational Security RiskPrivacy
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#OperationalSecurityRisk
    - https://w3id.org/dpv/risk#OperationalSecurityRisk + https://w3id.org/dpv/risk/owl/#Privacy
    + https://w3id.org/dpv/risk#Privacy
    rdfs:Class , owl:Class , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept + risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionRisks and issues that arise during operational processes
    - + - + @@ -14227,18 +16854,19 @@

    Out-Group Homogeneity Bias

    - @@ -14251,7 +16879,7 @@

    Out-Group Homogeneity Bias

    - + @@ -14260,19 +16888,22 @@

    Out-Group Homogeneity Bias

    - + - + - + + + + - + @@ -14286,26 +16917,25 @@

    Out-Group Homogeneity Bias

    - -
    -

    Payment

    +
    +

    Public Order Breach

    TermOutGroupHomogeneityBiasPsychologicalHarm Prefix risk-owl
    LabelOut-Group Homogeneity BiasPsychological Harm
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#OutGroupHomogeneityBias
    - https://w3id.org/dpv/risk#OutGroupHomogeneityBias + https://w3id.org/dpv/risk/owl/#PsychologicalHarm
    + https://w3id.org/dpv/risk#PsychologicalHarm
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:Harm + → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsConcept representing Psychological Harm
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented in
    - + - + @@ -14316,15 +16946,14 @@

    Payment

    , owl:Class , dpv-owl:RiskConcept , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact , risk-owl:PotentialRisk - @@ -14338,20 +16967,23 @@

    Payment

    - + - + + + + - + @@ -14359,7 +16991,7 @@

    Payment

    - + @@ -14374,25 +17006,25 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Public Services Exclusion

    TermPaymentPublicOrderBreach Prefix risk-owl
    LabelPaymentPublic Order Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Payment
    - https://w3id.org/dpv/risk#Payment + https://w3id.org/dpv/risk/owl/#PublicOrderBreach
    + https://w3id.org/dpv/risk#PublicOrderBreach
    Sub-class of risk-owl:Renumeration - → risk-owl:FinancialImpact + risk-owl:LegalComplianceRisk + → risk-owl:LegalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesConcept representing Public Order Breach
    SourceISO/IEC 27005:2018
    Date Created2024-04-142022-08-17
    Date Modified
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented in
    - + - + @@ -14410,7 +17042,8 @@

    Personal Safety Endangerment

    - @@ -14424,32 +17057,23 @@

    Personal Safety Endangerment

    - + - - - - + - + - - - - - - - - + + @@ -14463,26 +17087,25 @@

    Personal Safety Endangerment

    - -
    -

    Phishing Scam

    +
    +

    Racial Discrimination

    TermPersonalSafetyEndangermentPublicServicesExclusion Prefix risk-owl
    LabelPersonal Safety EndangermentPublic Services Exclusion
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PersonalSafetyEndangerment
    - https://w3id.org/dpv/risk#PersonalSafetyEndangerment + https://w3id.org/dpv/risk/owl/#PublicServicesExclusion
    + https://w3id.org/dpv/risk#PublicServicesExclusion
    Sub-class of risk-owl:SocietalRisk + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Personal Safety EndangermentStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -14491,18 +17114,18 @@

    Phishing Scam

    - @@ -14516,32 +17139,23 @@

    Phishing Scam

    - + - - - - + - + - - - - - - - - + + @@ -14555,25 +17169,25 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Racism

    TermPhishingScamRacialDiscrimination Prefix risk-owl
    LabelPhishing ScamRacial Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhishingScam
    - https://w3id.org/dpv/risk#PhishingScam + https://w3id.org/dpv/risk/owl/#RacialDiscrimination
    + https://w3id.org/dpv/risk#RacialDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat + risk-owl:Racism + → risk-owl:Discrimination + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamDiscrimination against individuals because of their racial background or skin color
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -14582,17 +17196,18 @@

    Physical Assault

    - @@ -14605,32 +17220,23 @@

    Physical Assault

    - + - - - - + - + - - - - - - - - + + @@ -14641,28 +17247,25 @@

    Physical Assault

    - - - -
    -

    Physical Harm

    +
    +

    Recovery Control

    TermPhysicalAssaultRacism Prefix risk-owl
    LabelPhysical AssaultRacism
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhysicalAssault
    - https://w3id.org/dpv/risk#PhysicalAssault + https://w3id.org/dpv/risk/owl/#Racism
    + https://w3id.org/dpv/risk#Racism
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:Harm - → risk-owl:IndividualRisk + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultPrejudice or discrimination against people based on their race
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -14671,28 +17274,35 @@

    Physical Harm

    - - + + + + - + + + + @@ -14702,37 +17312,41 @@

    Physical Harm

    - + + + + - +
    TermPhysicalHarmRecoveryControl Prefix risk-owl
    LabelPhysical HarmRecovery Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PhysicalHarm
    - https://w3id.org/dpv/risk#PhysicalHarm + https://w3id.org/dpv/risk/owl/#RecoveryControl
    + https://w3id.org/dpv/risk#RecoveryControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:IndividualRisk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionControl to recover from event
    Date Created2024-05-19
    Documented inRisk Risk-taxonomyRisk Risk-controls
    -
    -

    Potential Consequence

    + +
    +

    Reduce Likelihood

    - + - + @@ -14741,16 +17355,26 @@

    Potential Consequence

    - - + + + + @@ -14759,12 +17383,9 @@

    Potential Consequence

    - + - - - - + @@ -14775,7 +17396,7 @@

    Potential Consequence

    - + @@ -14784,32 +17405,33 @@

    Potential Consequence

    - +
    TermPotentialConsequenceReduceLikelihood Prefix risk-owl
    LabelPotential ConsequenceReduce Likelihood
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PotentialConsequence
    - https://w3id.org/dpv/risk#PotentialConsequence + https://w3id.org/dpv/risk/owl/#ReduceLikelihood
    + https://w3id.org/dpv/risk#ReduceLikelihood
    Type rdfs:Class , owl:Class + , risk-owl:RiskControl
    Sub-class of dpv-owl:RiskConcept + risk-owl:ReductionControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionIndicates a concept can potentially be a 'consequence concept within an use-caseControl that reduces the likelihood of an event
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    Documented inRisk CoreRisk Risk-controls
    -
    -

    Potential Impact

    + +
    +

    Reduce Severity

    - + - + @@ -14818,16 +17440,26 @@

    Potential Impact

    - - + + + + @@ -14836,12 +17468,9 @@

    Potential Impact

    - + - - - - + @@ -14852,7 +17481,7 @@

    Potential Impact

    - + @@ -14861,32 +17490,33 @@

    Potential Impact

    - +
    TermPotentialImpactReduceSeverity Prefix risk-owl
    LabelPotential ImpactReduce Severity
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PotentialImpact
    - https://w3id.org/dpv/risk#PotentialImpact + https://w3id.org/dpv/risk/owl/#ReduceSeverity
    + https://w3id.org/dpv/risk#ReduceSeverity
    Type rdfs:Class , owl:Class + , risk-owl:RiskControl
    Sub-class of dpv-owl:RiskConcept + risk-owl:ReductionControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionIndicates a concept can potentially be a 'impact' concept within an use-caseControl that reduces the severity of an event
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    Documented inRisk CoreRisk Risk-controls
    -
    -

    Potential Risk

    + +
    +

    Reduction Control

    - + - + @@ -14895,16 +17525,25 @@

    Potential Risk

    - - + + + + @@ -14913,12 +17552,9 @@

    Potential Risk

    - + - - - - + @@ -14929,41 +17565,45 @@

    Potential Risk

    - + - - - - + - +
    TermPotentialRiskReductionControl Prefix risk-owl
    LabelPotential RiskReduction Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PotentialRisk
    - https://w3id.org/dpv/risk#PotentialRisk + https://w3id.org/dpv/risk/owl/#ReductionControl
    + https://w3id.org/dpv/risk#ReductionControl
    Type rdfs:Class , owl:Class + , risk-owl:RiskControl
    Sub-class of dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk' concept within an use-caseControl that reduces the likelihood or severity of an event
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-controls
    -
    -

    Potential RiskSource

    + + + + + + + +
    +

    Re-identification

    - + - + @@ -14972,12 +17612,19 @@

    Potential RiskSource

    - @@ -14990,11 +17637,11 @@

    Potential RiskSource

    - + - + @@ -15006,16 +17653,19 @@

    Potential RiskSource

    - + - + + + + - +
    TermPotentialRiskSourceReidentification Prefix risk-owl
    LabelPotential RiskSourceRe-identification
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PotentialRiskSource
    - https://w3id.org/dpv/risk#PotentialRiskSource + https://w3id.org/dpv/risk/owl/#Reidentification
    + https://w3id.org/dpv/risk#Reidentification
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of dpv-owl:RiskConcept + risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionIndicates a concept can potentially be a 'risk source' concept within an use-caseConcept representing Re-identification
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-caseUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2024-09-292022-08-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-taxonomy
    @@ -15026,25 +17676,25 @@

    Potential RiskSource

    -
    -

    Privacy

    +
    +

    Religious Discrimination

    - + - + @@ -15053,16 +17703,18 @@

    Privacy

    - @@ -15073,7 +17725,10 @@

    Privacy

    - + + + + @@ -15083,7 +17738,10 @@

    Privacy

    - + + + + @@ -15096,28 +17754,25 @@

    Privacy

    - - - -
    -

    Psychological Harm

    +
    +

    Remedy Control

    TermPrivacyReligiousDiscrimination Prefix risk-owl
    LabelPrivacyReligious Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Privacy
    - https://w3id.org/dpv/risk#Privacy + https://w3id.org/dpv/risk/owl/#ReligiousDiscrimination
    + https://w3id.org/dpv/risk#ReligiousDiscrimination
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:IndividualRisk + risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionDiscrimination based on a person's religious beliefs or practices
    Date Created2024-09-30
    - + - + @@ -15126,21 +17781,25 @@

    Psychological Harm

    - - + + + + @@ -15149,35 +17808,26 @@

    Psychological Harm

    - + - - - - + - + - - - - - - - - + + - +
    TermPsychologicalHarmRemedyControl Prefix risk-owl
    LabelPsychological HarmRemedy Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PsychologicalHarm
    - https://w3id.org/dpv/risk#PsychologicalHarm + https://w3id.org/dpv/risk/owl/#RemedyControl
    + https://w3id.org/dpv/risk#RemedyControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskControl
    Sub-class of risk-owl:Harm - → risk-owl:IndividualRisk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Psychological HarmControl to remedy consequences of event
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-controls
    @@ -15185,27 +17835,25 @@

    Psychological Harm

    - - -
    -

    Public Order Breach

    +
    +

    Remove Consequence

    - + - + @@ -15214,20 +17862,26 @@

    Public Order Breach

    - - + + + + @@ -15236,35 +17890,29 @@

    Public Order Breach

    - + - - - - + - + - - - - + - +
    TermPublicOrderBreachRemoveConsequence Prefix risk-owl
    LabelPublic Order BreachRemove Consequence
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#PublicOrderBreach
    - https://w3id.org/dpv/risk#PublicOrderBreach + https://w3id.org/dpv/risk/owl/#RemoveConsequence
    + https://w3id.org/dpv/risk#RemoveConsequence
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialRisk + , risk-owl:RiskControl
    Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:ConsequenceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionSomething that acts as or causes Public Order BreachControl that removes Consequence i.e. prevents it from materialising
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-controls
    @@ -15272,28 +17920,25 @@

    Public Order Breach

    - - - -
    -

    Racial Discrimination

    +
    +

    Remove Impact

    - + - + @@ -15302,28 +17947,26 @@

    Racial Discrimination

    - - - - + + + + @@ -15332,7 +17975,7 @@

    Racial Discrimination

    - + @@ -15345,13 +17988,16 @@

    Racial Discrimination

    - + - + + + + - +
    TermRacialDiscriminationRemoveImpact Prefix risk-owl
    LabelRacial DiscriminationRemove Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RacialDiscrimination
    - https://w3id.org/dpv/risk#RacialDiscrimination + https://w3id.org/dpv/risk/owl/#RemoveImpact
    + https://w3id.org/dpv/risk#RemoveImpact
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:Racism - → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Racism - → risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:ImpactControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionDiscrimination against individuals because of their racial background or skin colorControl that removes Impact i.e. prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-controls
    @@ -15359,28 +18005,25 @@

    Racial Discrimination

    - - - -
    -

    Racism

    +
    +

    Remove Source

    - + - + @@ -15389,26 +18032,26 @@

    Racism

    - - - - + + + + @@ -15417,7 +18060,7 @@

    Racism

    - + @@ -15430,13 +18073,16 @@

    Racism

    - + - + + + + - +
    TermRacismRemoveSource Prefix risk-owl
    LabelRacismRemove Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Racism
    - https://w3id.org/dpv/risk#Racism + https://w3id.org/dpv/risk/owl/#RemoveSource
    + https://w3id.org/dpv/risk#RemoveSource
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept + , risk-owl:RiskControl
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:SourceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionPrejudice or discrimination against people based on their raceControl that removes the risk source
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-controls
    @@ -15444,25 +18090,28 @@

    Racism

    -
    -

    Recovery Control

    + + + +
    +

    Remuneration

    - + - + @@ -15471,25 +18120,22 @@

    Recovery Control

    - - - - - + @@ -15498,7 +18144,7 @@

    Recovery Control

    - + @@ -15511,13 +18157,19 @@

    Recovery Control

    - + - - + + + + + + + + - +
    TermRecoveryControlRenumeration Prefix risk-owl
    LabelRecovery ControlRemuneration
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RecoveryControl
    - https://w3id.org/dpv/risk#RecoveryControl + https://w3id.org/dpv/risk/owl/#Renumeration
    + https://w3id.org/dpv/risk#Renumeration
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to recover from eventSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -15525,25 +18177,28 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    + + + +
    +

    Reputational Risk

    - + - + @@ -15552,26 +18207,21 @@

    Reduce Likelihood

    - - - - - + @@ -15580,7 +18230,7 @@

    Reduce Likelihood

    - + @@ -15591,18 +18241,12 @@

    Reduce Likelihood

    - - - - + + - - - - - +
    TermReduceLikelihoodReputationalRisk Prefix risk-owl
    LabelReduce LikelihoodReputational Risk
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReduceLikelihood
    - https://w3id.org/dpv/risk#ReduceLikelihood + https://w3id.org/dpv/risk/owl/#ReputationalRisk
    + https://w3id.org/dpv/risk#ReputationalRisk
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ReductionControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the likelihood of an eventRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -15610,25 +18254,28 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    + + + +
    +

    Requirements Bias

    - + - + @@ -15637,26 +18284,23 @@

    Reduce Severity

    - - - - - + @@ -15665,29 +18309,35 @@

    Reduce Severity

    - + - + + + + - + + + + - + - + - +
    TermReduceSeverityRequirementsBias Prefix risk-owl
    LabelReduce SeverityRequirements Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReduceSeverity
    - https://w3id.org/dpv/risk#ReduceSeverity + https://w3id.org/dpv/risk/owl/#RequirementsBias
    + https://w3id.org/dpv/risk#RequirementsBias
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:ReductionControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that reduces the severity of an eventBias that occurs in or during requirements creation
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -15695,25 +18345,28 @@

    Reduce Severity

    -
    -

    Reduction Control

    + + + +
    +

    Reverse Discrimination

    - + - + @@ -15722,25 +18375,22 @@

    Reduction Control

    - - - - - - - + + + + @@ -15749,7 +18399,7 @@

    Reduction Control

    - + @@ -15762,13 +18412,13 @@

    Reduction Control

    - + - +
    TermReductionControlReverseDiscrimination Prefix risk-owl
    LabelReduction ControlReverse Discrimination
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReductionControl
    - https://w3id.org/dpv/risk#ReductionControl + https://w3id.org/dpv/risk/owl/#ReverseDiscrimination
    + https://w3id.org/dpv/risk#ReverseDiscrimination
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    risk-owl:Discrimination + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionControl that reduces the likelihood or severity of an eventDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    Date Created2024-05-192024-09-30
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -15779,28 +18429,25 @@

    Reduction Control

    - - - -
    -

    Re-identification

    +
    +

    Reward

    - + - + @@ -15810,16 +18457,17 @@

    Re-identification

    - @@ -15833,12 +18481,9 @@

    Re-identification

    - + - - - - + @@ -15849,7 +18494,7 @@

    Re-identification

    - + @@ -15857,7 +18502,7 @@

    Re-identification

    - + @@ -15872,25 +18517,25 @@

    Re-identification

    -
    -

    Religious Discrimination

    +
    +

    Rights Denied

    TermReidentificationReward Prefix risk-owl
    LabelRe-identificationReward
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Reidentification
    - https://w3id.org/dpv/risk#Reidentification + https://w3id.org/dpv/risk/owl/#Reward
    + https://w3id.org/dpv/risk#Reward
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:Renumeration + → risk-owl:FinancialImpact + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Re-identificationSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    Date Created2022-08-192024-04-14
    Date Modified
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented in
    - + - + @@ -15899,21 +18544,17 @@

    Religious Discrimination

    - - - @@ -15927,9 +18568,12 @@

    Religious Discrimination

    - + - + + + + @@ -15938,10 +18582,7 @@

    Religious Discrimination

    - - - - + @@ -15954,25 +18595,28 @@

    Religious Discrimination

    -
    -

    Remedy Control

    + + + +
    +

    Rights Eroded

    TermReligiousDiscriminationRightsDenied Prefix risk-owl
    LabelReligious DiscriminationRights Denied
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReligiousDiscrimination
    - https://w3id.org/dpv/risk#ReligiousDiscrimination + https://w3id.org/dpv/risk/owl/#RightsDenied
    + https://w3id.org/dpv/risk#RightsDenied
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionDiscrimination based on a person's religious beliefs or practicesThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-09-30
    - + - + @@ -15981,25 +18625,22 @@

    Remedy Control

    - - - - - + @@ -16008,9 +18649,12 @@

    Remedy Control

    - + - + + + + @@ -16019,15 +18663,12 @@

    Remedy Control

    - - - - + - +
    TermRemedyControlRightsEroded Prefix risk-owl
    LabelRemedy ControlRights Eroded
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemedyControl
    - https://w3id.org/dpv/risk#RemedyControl + https://w3id.org/dpv/risk/owl/#RightsEroded
    + https://w3id.org/dpv/risk#RightsEroded
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl to remedy consequences of eventThe gradual weakening or reduction of the scope and protection of rights
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-19
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -16035,25 +18676,28 @@

    Remedy Control

    -
    -

    Remove Consequence

    + + + +
    +

    Rights Exercise Prevented

    - + - + @@ -16062,26 +18706,22 @@

    Remove Consequence

    - - - - - + @@ -16090,9 +18730,12 @@

    Remove Consequence

    - + - + + + + @@ -16103,16 +18746,19 @@

    Remove Consequence

    - + - + + + + - + - +
    TermRemoveConsequenceRightsExercisePrevented Prefix risk-owl
    LabelRemove ConsequenceRights Exercise Prevented
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveConsequence
    - https://w3id.org/dpv/risk#RemoveConsequence + https://w3id.org/dpv/risk/owl/#RightsExercisePrevented
    + https://w3id.org/dpv/risk#RightsExercisePrevented
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ConsequenceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-192022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -16120,25 +18766,28 @@

    Remove Consequence

    -
    -

    Remove Impact

    + + + +
    +

    Rights Impact

    - + - + @@ -16147,26 +18796,21 @@

    Remove Impact

    - - - - - + @@ -16175,29 +18819,38 @@

    Remove Impact

    - + - + + + + - + + + + - + - + + + + - +
    TermRemoveImpactRightsImpact Prefix risk-owl
    LabelRemove ImpactRights Impact
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveImpact
    - https://w3id.org/dpv/risk#RemoveImpact + https://w3id.org/dpv/risk/owl/#RightsImpact
    + https://w3id.org/dpv/risk#RightsImpact
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:ImpactControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingConcept representing Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -16205,25 +18858,28 @@

    Remove Impact

    -
    -

    Remove Source

    + + + +
    +

    Rights Limited

    - + - + @@ -16232,26 +18888,22 @@

    Remove Source

    - - - - - + @@ -16260,9 +18912,12 @@

    Remove Source

    - + - + + + + @@ -16273,16 +18928,19 @@

    Remove Source

    - + - + + + + - + - +
    TermRemoveSourceRightsLimited Prefix risk-owl
    LabelRemove SourceRights Limited
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RemoveSource
    - https://w3id.org/dpv/risk#RemoveSource + https://w3id.org/dpv/risk/owl/#RightsLimited
    + https://w3id.org/dpv/risk#RightsLimited
    Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:SourceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that removes the risk sourceA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-192022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-controlsRisk Risk-taxonomy
    @@ -16293,25 +18951,25 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Rights Obstructed

    - + - + @@ -16329,7 +18987,8 @@

    Remuneration

    - @@ -16343,9 +19002,12 @@

    Remuneration

    - + - + + + + @@ -16354,18 +19016,9 @@

    Remuneration

    - - - - - - - - - - - - + + + @@ -16379,25 +19032,25 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Rights Unfulfilled

    TermRenumerationRightsObstructed Prefix risk-owl
    LabelRemunerationRights Obstructed
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Renumeration
    - https://w3id.org/dpv/risk#Renumeration + https://w3id.org/dpv/risk/owl/#RightsObstructed
    + https://w3id.org/dpv/risk#RightsObstructed
    Sub-class of risk-owl:FinancialImpact + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -16415,7 +19068,9 @@

    Reputational Risk

    - @@ -16428,9 +19083,12 @@

    Reputational Risk

    - + - + + + + @@ -16455,25 +19113,25 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    Rights Violated

    TermReputationalRiskRightsUnfulfilled Prefix risk-owl
    LabelReputational RiskRights Unfulfilled
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReputationalRisk
    - https://w3id.org/dpv/risk#ReputationalRisk + https://w3id.org/dpv/risk/owl/#RightsUnfulfilled
    + https://w3id.org/dpv/risk#RightsUnfulfilled
    Sub-class of dpv-owl:RiskConcept + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionRisks and issues that affect the reputation of the organisationFailure to meet or complete the fulfilment of rights
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    - + - + @@ -16482,18 +19140,18 @@

    Requirements Bias

    - @@ -16506,31 +19164,31 @@

    Requirements Bias

    - + - + - - - - + - + - + + + + - + @@ -16539,31 +19197,31 @@

    Requirements Bias

    TermRequirementsBiasRightsViolated Prefix risk-owl
    LabelRequirements BiasRights Violated
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RequirementsBias
    - https://w3id.org/dpv/risk#RequirementsBias + https://w3id.org/dpv/risk/owl/#RightsViolated
    + https://w3id.org/dpv/risk#RightsViolated
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:RightsImpact + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs in or during requirements creationThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifestThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-132022-08-18
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    Documented in
    + + + + - - - - -
    -

    Reverse Discrimination

    +
    +

    Risk Analysis

    - + - + @@ -16572,22 +19230,13 @@

    Reverse Discrimination

    - - - @@ -16600,55 +19249,57 @@

    Reverse Discrimination

    - + - + + + + - + - + + + + - +
    TermReverseDiscriminationRiskAnalysis Prefix risk-owl
    LabelReverse DiscriminationRisk Analysis
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#ReverseDiscrimination
    - https://w3id.org/dpv/risk#ReverseDiscrimination + https://w3id.org/dpv/risk/owl/#RiskAnalysis
    + https://w3id.org/dpv/risk#RiskAnalysis
    Type rdfs:Class , owl:Class - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk - , risk-owl:RiskConcept
    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Discrimination - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equalityA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2024-09-302022-08-18
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    - - - - -
    -

    Reward

    +
    +

    Risk Assessment

    - + - + @@ -16657,18 +19308,12 @@

    Reward

    - @@ -16681,61 +19326,54 @@

    Reward

    - + - + + + + - + - - - - - - - - + + - +
    TermRewardRiskAssessment Prefix risk-owl
    LabelRewardRisk Assessment
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Reward
    - https://w3id.org/dpv/risk#Reward + https://w3id.org/dpv/risk/owl/#RiskAssessment
    + https://w3id.org/dpv/risk#RiskAssessment
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:Renumeration - → risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeAssessment of risk involving its identification, analysis, and evaluation
    Source
    Date Created2024-04-142024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    - - - - -
    -

    Erosion of Rights

    +
    +

    Risk Control

    - + - + @@ -16744,22 +19382,23 @@

    Erosion of Rights

    - - + + + + @@ -16768,13 +19407,14 @@

    Erosion of Rights

    - + - - - - + + + + @@ -16782,41 +19422,40 @@

    Erosion of Rights

    - + + + + - +
    TermRightErodedRiskControl Prefix risk-owl
    LabelErosion of RightsRisk Control
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightEroded
    - https://w3id.org/dpv/risk#RightEroded + https://w3id.org/dpv/risk/owl/#RiskControl
    + https://w3id.org/dpv/risk#RiskControl
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
    DefinitionThe gradual weakening or reduction of the scope and protection of rightsControl that modifies risk
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Examples Using risk controls to express how tech/org measures address the risk (E0071) +
    Date Created2024-05-19
    Documented inRisk Risk-taxonomyDex Risk-controls
    - - - - -
    -

    Obstruction of Rights

    +
    +

    Risk Management

    - + - + @@ -16825,19 +19464,10 @@

    Obstruction of Rights

    - - - + @@ -16849,26 +19479,29 @@

    Obstruction of Rights

    - + - - - - + - + + + + - + + + + - +
    TermRightObstructedRiskManagement Prefix risk-owl
    LabelObstruction of RightsRisk Management
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightObstructed
    - https://w3id.org/dpv/risk#RightObstructed + https://w3id.org/dpv/risk/owl/#RiskManagement
    + https://w3id.org/dpv/risk#RiskManagement
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept -
    DefinitionInterference with or blocking of the exercise of rightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-06-12
    Documented inRisk Risk-taxonomyRisk Core
    @@ -16876,28 +19509,25 @@

    Obstruction of Rights

    - - - -
    -

    Denial of Rights

    +
    +

    Risk Matrix

    - + - + @@ -16906,18 +19536,14 @@

    Denial of Rights

    - @@ -16930,26 +19556,32 @@

    Denial of Rights

    - + - - - - + - + + + + - - + + + + + + + + - +
    TermRightsDenialRiskMatrix Prefix risk-owl
    LabelDenial of RightsRisk Matrix
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsDenial
    - https://w3id.org/dpv/risk#RightsDenial + https://w3id.org/dpv/risk/owl/#RiskMatrix
    + https://w3id.org/dpv/risk#RiskMatrix
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskAssessment
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionThe refusal or withholding or denial of the existence or applicability of rightsCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceIEC 31010:2019
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Core
    @@ -16957,28 +19589,25 @@

    Denial of Rights

    - - - -
    -

    Prevent Exercising of Rights

    +
    +

    Risk Matrix 3x3

    - + - + @@ -16987,18 +19616,15 @@

    Prevent Exercising of Rights

    - @@ -17011,12 +19637,9 @@

    Prevent Exercising of Rights

    - + - - - - + @@ -17027,19 +19650,16 @@

    Prevent Exercising of Rights

    - + - - - - + - + - +
    TermRightsExercisePreventionRiskMatrix3x3 Prefix risk-owl
    LabelPrevent Exercising of RightsRisk Matrix 3x3
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsExercisePrevention
    - https://w3id.org/dpv/risk#RightsExercisePrevention + https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
    + https://w3id.org/dpv/risk#RiskMatrix3x3
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionActions or measures that prevent an individual or group from exercising their legal rights.A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-matrix
    @@ -17047,28 +19667,25 @@

    Prevent Exercising of Rights

    - - - -
    -

    Impact to Rights

    +
    +

    Risk Matrix 5x5

    - + - + @@ -17077,17 +19694,15 @@

    Impact to Rights

    - @@ -17100,20 +19715,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -17121,17 +19730,14 @@

    Impact to Rights

    - - - - + - +
    TermRightsImpactRiskMatrix5x5 Prefix risk-owl
    LabelImpact to RightsRisk Matrix 5x5
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsImpact
    - https://w3id.org/dpv/risk#RightsImpact + https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
    + https://w3id.org/dpv/risk#RiskMatrix5x5
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionSomething that acts as or causes Impact to RightsA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-matrix
    @@ -17139,28 +19745,25 @@

    Impact to Rights

    - - - -
    -

    Limitation of Rights

    +
    +

    Risk Matrix 7x7

    - + - + @@ -17169,18 +19772,15 @@

    Limitation of Rights

    - @@ -17193,12 +19793,9 @@

    Limitation of Rights

    - + - - - - + @@ -17209,48 +19806,41 @@

    Limitation of Rights

    - + - - - - + - + - +
    TermRightsLimitationRiskMatrix7x7 Prefix risk-owl
    LabelLimitation of RightsRisk Matrix 7x7
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsLimitation
    - https://w3id.org/dpv/risk#RightsLimitation + https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
    + https://w3id.org/dpv/risk#RiskMatrix7x7
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionA limitation or restrictions on the scope or exercise of rightsA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-matrix
    - - - - -
    -

    Unfulfilment of Rights

    +
    +

    Risk Source

    - + - + @@ -17259,22 +19849,20 @@

    Unfulfilment of Rights

    - - + + + + @@ -17283,12 +19871,9 @@

    Unfulfilment of Rights

    - + - - - - + @@ -17297,12 +19882,18 @@

    Unfulfilment of Rights

    - - + + + + + + + + - +
    TermRightsUnfulfilledRiskSource Prefix risk-owl
    LabelUnfulfilment of RightsRisk Source
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsUnfulfilled
    - https://w3id.org/dpv/risk#RightsUnfulfilled + https://w3id.org/dpv/risk/owl/#RiskSource
    + https://w3id.org/dpv/risk#RiskSource
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    in Range of risk-owl:hasRiskSource +
    DefinitionFailure to meet or complete the fulfilment of rightsThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-02-14
    Date Modified2024-08-16
    Documented inRisk Risk-taxonomyRisk Core
    @@ -17310,28 +19901,25 @@

    Unfulfilment of Rights

    - - - -
    -

    Violation of Rights

    +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + @@ -17340,18 +19928,16 @@

    Violation of Rights

    - @@ -17364,12 +19950,9 @@

    Violation of Rights

    - + - - - - + @@ -17380,48 +19963,42 @@

    Violation of Rights

    - + - - - - + - + - +
    TermRightsViolationRM3x3S1L1 Prefix risk-owl
    LabelViolation of RightsLow Risk (RM3x3 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RightsViolation
    - https://w3id.org/dpv/risk#RightsViolation + https://w3id.org/dpv/risk/owl/#RM3x3S1L1
    + https://w3id.org/dpv/risk#RM3x3S1L1
    Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept - , risk-owl:PotentialConsequence - , risk-owl:PotentialImpact - , risk-owl:PotentialRisk + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RightsImpact - → risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rightsNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomyRisk Risk-matrix
    - - - - -
    -

    Risk Analysis

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    - + - + @@ -17430,12 +20007,15 @@

    Risk Analysis

    - @@ -17449,23 +20029,20 @@

    Risk Analysis

    - + - - - - + - + @@ -17474,32 +20051,33 @@

    Risk Analysis

    - +
    TermRiskAnalysisRM3x3S1L2 Prefix risk-owl
    LabelRisk AnalysisLow Risk (RM3x3 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskAnalysis
    - https://w3id.org/dpv/risk#RiskAnalysis + https://w3id.org/dpv/risk/owl/#RM3x3S1L2
    + https://w3id.org/dpv/risk#RM3x3S1L2
    Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskAssessment + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment → risk-owl:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    Documented inRisk CoreRisk Risk-matrix
    -
    -

    Risk Assessment

    + +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    - + - + @@ -17508,12 +20086,16 @@

    Risk Assessment

    - @@ -17526,54 +20108,55 @@

    Risk Assessment

    - + - - - - + - + - + + + + - +
    TermRiskAssessmentRM3x3S1L3 Prefix risk-owl
    LabelRisk AssessmentModerate Risk (RM3x3 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskAssessment
    - https://w3id.org/dpv/risk#RiskAssessment + https://w3id.org/dpv/risk/owl/#RM3x3S1L3
    + https://w3id.org/dpv/risk#RM3x3S1L3
    Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskManagement + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-matrix
    -
    -

    Risk Control

    + +
    +

    Low Risk (RM3x3 S:2 L:1)

    - + - + @@ -17582,23 +20165,20 @@

    Risk Control

    - - - - - + @@ -17607,14 +20187,10 @@

    Risk Control

    - + - - - @@ -17624,38 +20200,42 @@

    Risk Control

    - + - + + + + - +
    TermRiskControlRM3x3S2L1 Prefix risk-owl
    LabelRisk ControlLow Risk (RM3x3 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskControl
    - https://w3id.org/dpv/risk#RiskControl + https://w3id.org/dpv/risk/owl/#RM3x3S2L1
    + https://w3id.org/dpv/risk#RM3x3S2L1
    Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
    Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
    DefinitionControl that modifies riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Examples Using risk controls to express how tech/org measures address the risk (E0071) -
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inDex Risk-controlsRisk Risk-matrix
    -
    -

    Risk Management

    + +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    - + - + @@ -17664,10 +20244,17 @@

    Risk Management

    - + + + @@ -17679,29 +20266,29 @@

    Risk Management

    - + - - - - + - + - + + + + - +
    TermRiskManagementRM3x3S2L2 Prefix risk-owl
    LabelRisk ManagementModerate Risk (RM3x3 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskManagement
    - https://w3id.org/dpv/risk#RiskManagement + https://w3id.org/dpv/risk/owl/#RM3x3S2L2
    + https://w3id.org/dpv/risk#RM3x3S2L2
    Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-matrix
    @@ -17709,25 +20296,25 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    High Risk (RM3x3 S:2 L:3)

    - + - + @@ -17736,13 +20323,15 @@

    Risk Matrix

    - @@ -17756,23 +20345,20 @@

    Risk Matrix

    - + - - - - + - + @@ -17781,7 +20367,7 @@

    Risk Matrix

    - +
    TermRiskMatrixRM3x3S2L3 Prefix risk-owl
    LabelRisk MatrixHigh Risk (RM3x3 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix
    - https://w3id.org/dpv/risk#RiskMatrix + https://w3id.org/dpv/risk/owl/#RM3x3S2L3
    + https://w3id.org/dpv/risk#RM3x3S2L3
    Type rdfs:Class , owl:Class - , risk-owl:RiskAssessment + , risk-owl:RiskAnalysis
    Sub-class of risk-owl:RiskAssessment + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment → risk-owl:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    Documented inRisk CoreRisk Risk-matrix
    @@ -17789,25 +20375,25 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    - + - + @@ -17822,7 +20408,8 @@

    Risk Matrix 3x3

    - @@ -17837,7 +20424,7 @@

    Risk Matrix 3x3

    - + @@ -17867,25 +20454,25 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRiskMatrix3x3RM3x3S3L1 Prefix risk-owl
    LabelRisk Matrix 3x3Moderate Risk (RM3x3 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
    - https://w3id.org/dpv/risk#RiskMatrix3x3 + https://w3id.org/dpv/risk/owl/#RM3x3S3L1
    + https://w3id.org/dpv/risk#RM3x3S3L1
    Sub-class of risk-owl:RiskMatrix + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -17900,7 +20487,8 @@

    Risk Matrix 5x5

    - @@ -17915,7 +20503,7 @@

    Risk Matrix 5x5

    - + @@ -17945,25 +20533,25 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRiskMatrix5x5RM3x3S3L2 Prefix risk-owl
    LabelRisk Matrix 5x5High Risk (RM3x3 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
    - https://w3id.org/dpv/risk#RiskMatrix5x5 + https://w3id.org/dpv/risk/owl/#RM3x3S3L2
    + https://w3id.org/dpv/risk#RM3x3S3L2
    Sub-class of risk-owl:RiskMatrix + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -17978,7 +20566,8 @@

    Risk Matrix 7x7

    - @@ -17993,7 +20582,7 @@

    Risk Matrix 7x7

    - + @@ -18022,25 +20611,26 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRiskMatrix7x7RM3x3S3L3 Prefix risk-owl
    LabelRisk Matrix 7x7High Risk (RM3x3 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
    - https://w3id.org/dpv/risk#RiskMatrix7x7 + https://w3id.org/dpv/risk/owl/#RM3x3S3L3
    + https://w3id.org/dpv/risk#RM3x3S3L3
    Sub-class of risk-owl:RiskMatrix + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    - + - + @@ -18049,20 +20639,20 @@

    Risk Source

    - - - - - + @@ -18071,7 +20661,7 @@

    Risk Source

    - + @@ -18084,16 +20674,16 @@

    Risk Source

    - + + - - + + - - +
    TermRiskSourceRM5x5S1L1 Prefix risk-owl
    LabelRisk SourceVery Low Risk (RM5x5 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RiskSource
    - https://w3id.org/dpv/risk#RiskSource + https://w3id.org/dpv/risk/owl/#RM5x5S1L1
    + https://w3id.org/dpv/risk#RM5x5S1L1
    Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
    Sub-class of dpv-owl:RiskConcept + risk-owl:RiskMatrix5x5 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
    in Range of risk-owl:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16ContributorsHarshvardhan J. Pandit
    Documented inRisk CoreRisk Risk-matrix
    @@ -18101,25 +20691,25 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    - + - + @@ -18134,7 +20724,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -18180,25 +20770,25 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM3x3S1L1RM5x5S1L2 Prefix risk-owl
    LabelLow Risk (RM3x3 S:1 L:1)Very Low Risk (RM5x5 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L1
    - https://w3id.org/dpv/risk#RM3x3S1L1 + https://w3id.org/dpv/risk/owl/#RM5x5S1L2
    + https://w3id.org/dpv/risk#RM5x5S1L2
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18150,7 +20740,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + @@ -18213,7 +20803,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -18259,25 +20849,25 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM3x3S1L2RM5x5S1L3 Prefix risk-owl
    LabelLow Risk (RM3x3 S:1 L:2)Very Low Risk (RM5x5 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L2
    - https://w3id.org/dpv/risk#RM3x3S1L2 + https://w3id.org/dpv/risk/owl/#RM5x5S1L3
    + https://w3id.org/dpv/risk#RM5x5S1L3
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18229,7 +20819,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + @@ -18292,7 +20882,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -18338,25 +20928,25 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM3x3S1L3RM5x5S1L4 Prefix risk-owl
    LabelModerate Risk (RM3x3 S:1 L:3)Low Risk (RM5x5 S:1 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S1L3
    - https://w3id.org/dpv/risk#RM3x3S1L3 + https://w3id.org/dpv/risk/owl/#RM5x5S1L4
    + https://w3id.org/dpv/risk#RM5x5S1L4
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18308,7 +20898,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + @@ -18371,7 +20961,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -18417,25 +21007,25 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM3x3S2L1RM5x5S1L5 Prefix risk-owl
    LabelLow Risk (RM3x3 S:2 L:1)Low Risk (RM5x5 S:1 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L1
    - https://w3id.org/dpv/risk#RM3x3S2L1 + https://w3id.org/dpv/risk/owl/#RM5x5S1L5
    + https://w3id.org/dpv/risk#RM5x5S1L5
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18387,7 +20977,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + @@ -18450,7 +21040,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -18496,25 +21086,25 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM3x3S2L2RM5x5S2L1 Prefix risk-owl
    LabelModerate Risk (RM3x3 S:2 L:2)Very Low Risk (RM5x5 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L2
    - https://w3id.org/dpv/risk#RM3x3S2L2 + https://w3id.org/dpv/risk/owl/#RM5x5S2L1
    + https://w3id.org/dpv/risk#RM5x5S2L1
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18466,7 +21056,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -18529,7 +21119,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -18575,25 +21165,25 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM3x3S2L3RM5x5S2L2 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:2 L:3)Low Risk (RM5x5 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S2L3
    - https://w3id.org/dpv/risk#RM3x3S2L3 + https://w3id.org/dpv/risk/owl/#RM5x5S2L2
    + https://w3id.org/dpv/risk#RM5x5S2L2
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18545,7 +21135,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -18608,7 +21198,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -18654,25 +21244,25 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM3x3S3L1RM5x5S2L3 Prefix risk-owl
    LabelModerate Risk (RM3x3 S:3 L:1)Moderate Risk (RM5x5 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L1
    - https://w3id.org/dpv/risk#RM3x3S3L1 + https://w3id.org/dpv/risk/owl/#RM5x5S2L3
    + https://w3id.org/dpv/risk#RM5x5S2L3
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18624,7 +21214,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -18687,7 +21277,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -18733,25 +21323,25 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM3x3S3L2RM5x5S2L4 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM5x5 S:2 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L2
    - https://w3id.org/dpv/risk#RM3x3S3L2 + https://w3id.org/dpv/risk/owl/#RM5x5S2L4
    + https://w3id.org/dpv/risk#RM5x5S2L4
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18703,7 +21293,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + @@ -18766,7 +21356,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -18812,25 +21402,25 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM3x3S3L3RM5x5S2L5 Prefix risk-owl
    LabelHigh Risk (RM3x3 S:3 L:3)High Risk (RM5x5 S:2 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM3x3S3L3
    - https://w3id.org/dpv/risk#RM3x3S3L3 + https://w3id.org/dpv/risk/owl/#RM5x5S2L5
    + https://w3id.org/dpv/risk#RM5x5S2L5
    Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -18782,7 +21372,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + @@ -18861,7 +21451,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -18891,25 +21481,25 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S1L1RM5x5S3L1 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:1)Very Low Risk (RM5x5 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L1
    - https://w3id.org/dpv/risk#RM5x5S1L1 + https://w3id.org/dpv/risk/owl/#RM5x5S3L1
    + https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -18940,7 +21530,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -18970,25 +21560,25 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S1L2RM5x5S3L2 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:2)Moderate Risk (RM5x5 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L2
    - https://w3id.org/dpv/risk#RM5x5S1L2 + https://w3id.org/dpv/risk/owl/#RM5x5S3L2
    + https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -19019,7 +21609,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -19049,25 +21639,25 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S1L3RM5x5S3L3 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L3
    - https://w3id.org/dpv/risk#RM5x5S1L3 + https://w3id.org/dpv/risk/owl/#RM5x5S3L3
    + https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -19098,7 +21688,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -19128,25 +21718,25 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S1L4RM5x5S3L4 Prefix risk-owl
    LabelLow Risk (RM5x5 S:1 L:4)High Risk (RM5x5 S:3 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L4
    - https://w3id.org/dpv/risk#RM5x5S1L4 + https://w3id.org/dpv/risk/owl/#RM5x5S3L4
    + https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -19177,7 +21767,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -19207,25 +21797,25 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S1L5RM5x5S3L5 Prefix risk-owl
    LabelLow Risk (RM5x5 S:1 L:5)Very High Risk (RM5x5 S:3 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S1L5
    - https://w3id.org/dpv/risk#RM5x5S1L5 + https://w3id.org/dpv/risk/owl/#RM5x5S3L5
    + https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -19256,7 +21846,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -19286,25 +21876,25 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S2L1RM5x5S4L1 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:2 L:1)Low Risk (RM5x5 S:4 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L1
    - https://w3id.org/dpv/risk#RM5x5S2L1 + https://w3id.org/dpv/risk/owl/#RM5x5S4L1
    + https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -19335,7 +21925,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -19365,25 +21955,25 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S2L2RM5x5S4L2 Prefix risk-owl
    LabelLow Risk (RM5x5 S:2 L:2)Moderate Risk (RM5x5 S:4 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L2
    - https://w3id.org/dpv/risk#RM5x5S2L2 + https://w3id.org/dpv/risk/owl/#RM5x5S4L2
    + https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -19414,7 +22004,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -19444,25 +22034,25 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S2L3RM5x5S4L3 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:2 L:3)High Risk (RM5x5 S:4 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L3
    - https://w3id.org/dpv/risk#RM5x5S2L3 + https://w3id.org/dpv/risk/owl/#RM5x5S4L3
    + https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -19493,7 +22083,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -19523,25 +22113,25 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S2L4RM5x5S4L4 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:2 L:4)Very High Risk (RM5x5 S:4 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L4
    - https://w3id.org/dpv/risk#RM5x5S2L4 + https://w3id.org/dpv/risk/owl/#RM5x5S4L4
    + https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -19572,7 +22162,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -19602,25 +22192,25 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S2L5RM5x5S4L5 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:4 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S2L5
    - https://w3id.org/dpv/risk#RM5x5S2L5 + https://w3id.org/dpv/risk/owl/#RM5x5S4L5
    + https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -19651,7 +22241,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -19681,25 +22271,25 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S3L1RM5x5S5L1 Prefix risk-owl
    LabelVery Low Risk (RM5x5 S:3 L:1)Low Risk (RM5x5 S:5 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L1
    - https://w3id.org/dpv/risk#RM5x5S3L1 + https://w3id.org/dpv/risk/owl/#RM5x5S5L1
    + https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -19730,7 +22320,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -19760,25 +22350,25 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S3L2RM5x5S5L2 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:3 L:2)High Risk (RM5x5 S:5 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L2
    - https://w3id.org/dpv/risk#RM5x5S3L2 + https://w3id.org/dpv/risk/owl/#RM5x5S5L2
    + https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + @@ -19809,7 +22399,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -19839,25 +22429,25 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S3L3RM5x5S5L3 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:5 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L3
    - https://w3id.org/dpv/risk#RM5x5S3L3 + https://w3id.org/dpv/risk/owl/#RM5x5S5L3
    + https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -19888,7 +22478,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -19918,25 +22508,25 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S3L4RM5x5S5L4 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:3 L:4)Very High Risk (RM5x5 S:5 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L4
    - https://w3id.org/dpv/risk#RM5x5S3L4 + https://w3id.org/dpv/risk/owl/#RM5x5S5L4
    + https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -19967,7 +22557,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -19997,25 +22587,25 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S3L5RM5x5S5L5 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:5 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S3L5
    - https://w3id.org/dpv/risk#RM5x5S3L5 + https://w3id.org/dpv/risk/owl/#RM5x5S5L5
    + https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -20030,7 +22620,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - - + @@ -20076,25 +22666,25 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S4L1RM7x7S1L1 Prefix risk-owl
    LabelLow Risk (RM5x5 S:4 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L1
    - https://w3id.org/dpv/risk#RM5x5S4L1 + https://w3id.org/dpv/risk/owl/#RM7x7S1L1
    + https://w3id.org/dpv/risk#RM7x7S1L1
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20046,7 +22636,7 @@

    Low Risk (RM5x5 S:4 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -20109,7 +22699,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -20155,25 +22745,25 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S4L2RM7x7S1L2 Prefix risk-owl
    LabelModerate Risk (RM5x5 S:4 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L2
    - https://w3id.org/dpv/risk#RM5x5S4L2 + https://w3id.org/dpv/risk/owl/#RM7x7S1L2
    + https://w3id.org/dpv/risk#RM7x7S1L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20125,7 +22715,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + @@ -20188,7 +22778,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -20234,25 +22824,25 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S4L3RM7x7S1L3 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:4 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L3
    - https://w3id.org/dpv/risk#RM5x5S4L3 + https://w3id.org/dpv/risk/owl/#RM7x7S1L3
    + https://w3id.org/dpv/risk#RM7x7S1L3
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20204,7 +22794,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + @@ -20267,7 +22857,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -20313,25 +22903,25 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S4L4RM7x7S1L4 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:4 L:4)Very Low Risk (RM7x7 S:1 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L4
    - https://w3id.org/dpv/risk#RM5x5S4L4 + https://w3id.org/dpv/risk/owl/#RM7x7S1L4
    + https://w3id.org/dpv/risk#RM7x7S1L4
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20283,7 +22873,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + @@ -20346,7 +22936,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -20392,25 +22982,25 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    TermRM5x5S4L5RM7x7S1L5 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:4 L:5)Very Low Risk (RM7x7 S:1 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S4L5
    - https://w3id.org/dpv/risk#RM5x5S4L5 + https://w3id.org/dpv/risk/owl/#RM7x7S1L5
    + https://w3id.org/dpv/risk#RM7x7S1L5
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20362,7 +22952,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    - + - + @@ -20425,7 +23015,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + @@ -20471,25 +23061,25 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM5x5S5L1RM7x7S1L6 Prefix risk-owl
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:1 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L1
    - https://w3id.org/dpv/risk#RM5x5S5L1 + https://w3id.org/dpv/risk/owl/#RM7x7S1L6
    + https://w3id.org/dpv/risk#RM7x7S1L6
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20441,7 +23031,7 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + @@ -20504,7 +23094,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -20550,25 +23140,25 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S5L2RM7x7S1L7 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:1 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L2
    - https://w3id.org/dpv/risk#RM5x5S5L2 + https://w3id.org/dpv/risk/owl/#RM7x7S1L7
    + https://w3id.org/dpv/risk#RM7x7S1L7
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20520,7 +23110,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + @@ -20583,7 +23173,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -20629,25 +23219,25 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S5L3RM7x7S2L1 Prefix risk-owl
    LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L3
    - https://w3id.org/dpv/risk#RM5x5S5L3 + https://w3id.org/dpv/risk/owl/#RM7x7S2L1
    + https://w3id.org/dpv/risk#RM7x7S2L1
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20599,7 +23189,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -20662,7 +23252,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -20708,25 +23298,25 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S5L4RM7x7S2L2 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:5 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L4
    - https://w3id.org/dpv/risk#RM5x5S5L4 + https://w3id.org/dpv/risk/owl/#RM7x7S2L2
    + https://w3id.org/dpv/risk#RM7x7S2L2
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20678,7 +23268,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + @@ -20741,7 +23331,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -20787,25 +23377,25 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S5L5RM7x7S2L3 Prefix risk-owl
    LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM5x5S5L5
    - https://w3id.org/dpv/risk#RM5x5S5L5 + https://w3id.org/dpv/risk/owl/#RM7x7S2L3
    + https://w3id.org/dpv/risk#RM7x7S2L3
    Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7 → risk-owl:RiskMatrix → risk-owl:RiskAssessment → risk-owl:RiskManagement @@ -20757,7 +23347,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + @@ -20836,7 +23426,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -20866,25 +23456,25 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S1L1RM7x7S2L4 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM7x7 S:2 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L1
    - https://w3id.org/dpv/risk#RM7x7S1L1 + https://w3id.org/dpv/risk/owl/#RM7x7S2L4
    + https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + @@ -20915,7 +23505,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -20945,25 +23535,25 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S1L2RM7x7S2L5 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:2 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L2
    - https://w3id.org/dpv/risk#RM7x7S1L2 + https://w3id.org/dpv/risk/owl/#RM7x7S2L5
    + https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + @@ -20994,7 +23584,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -21024,25 +23614,25 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S1L3RM7x7S2L6 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L3
    - https://w3id.org/dpv/risk#RM7x7S1L3 + https://w3id.org/dpv/risk/owl/#RM7x7S2L6
    + https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + @@ -21073,7 +23663,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -21103,25 +23693,25 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S1L4RM7x7S2L7 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L4
    - https://w3id.org/dpv/risk#RM7x7S1L4 + https://w3id.org/dpv/risk/owl/#RM7x7S2L7
    + https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + @@ -21152,7 +23742,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -21182,25 +23772,25 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S1L5RM7x7S3L1 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L5
    - https://w3id.org/dpv/risk#RM7x7S1L5 + https://w3id.org/dpv/risk/owl/#RM7x7S3L1
    + https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -21231,7 +23821,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -21261,25 +23851,25 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S1L6RM7x7S3L2 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:1 L:6)Very Low Risk (RM7x7 S:3 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L6
    - https://w3id.org/dpv/risk#RM7x7S1L6 + https://w3id.org/dpv/risk/owl/#RM7x7S3L2
    + https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + @@ -21310,7 +23900,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -21340,25 +23930,25 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S1L7RM7x7S3L3 Prefix risk-owl
    LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:3 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S1L7
    - https://w3id.org/dpv/risk#RM7x7S1L7 + https://w3id.org/dpv/risk/owl/#RM7x7S3L3
    + https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + @@ -21389,7 +23979,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -21419,25 +24009,25 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S2L1RM7x7S3L4 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:3 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L1
    - https://w3id.org/dpv/risk#RM7x7S2L1 + https://w3id.org/dpv/risk/owl/#RM7x7S3L4
    + https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + @@ -21468,7 +24058,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -21498,25 +24088,25 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S2L2RM7x7S3L5 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:2 L:2)High Risk (RM7x7 S:3 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L2
    - https://w3id.org/dpv/risk#RM7x7S2L2 + https://w3id.org/dpv/risk/owl/#RM7x7S3L5
    + https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + @@ -21547,7 +24137,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -21577,25 +24167,25 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S2L3RM7x7S3L6 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:2 L:3)High Risk (RM7x7 S:3 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L3
    - https://w3id.org/dpv/risk#RM7x7S2L3 + https://w3id.org/dpv/risk/owl/#RM7x7S3L6
    + https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + @@ -21626,7 +24216,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -21656,25 +24246,25 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S2L4RM7x7S3L7 Prefix risk-owl
    LabelLow Risk (RM7x7 S:2 L:4)Very High Risk (RM7x7 S:3 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L4
    - https://w3id.org/dpv/risk#RM7x7S2L4 + https://w3id.org/dpv/risk/owl/#RM7x7S3L7
    + https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + @@ -21705,7 +24295,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -21735,25 +24325,25 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S2L5RM7x7S4L1 Prefix risk-owl
    LabelLow Risk (RM7x7 S:2 L:5)Extremely Low Risk (RM7x7 S:4 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L5
    - https://w3id.org/dpv/risk#RM7x7S2L5 + https://w3id.org/dpv/risk/owl/#RM7x7S4L1
    + https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + @@ -21784,7 +24374,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -21814,25 +24404,25 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S2L6RM7x7S4L2 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:2 L:6)Low Risk (RM7x7 S:4 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L6
    - https://w3id.org/dpv/risk#RM7x7S2L6 + https://w3id.org/dpv/risk/owl/#RM7x7S4L2
    + https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -21863,7 +24453,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -21893,25 +24483,25 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S2L7RM7x7S4L3 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:2 L:7)Moderate Risk (RM7x7 S:4 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S2L7
    - https://w3id.org/dpv/risk#RM7x7S2L7 + https://w3id.org/dpv/risk/owl/#RM7x7S4L3
    + https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -21942,7 +24532,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -21972,25 +24562,25 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S3L1RM7x7S4L4 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:4 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L1
    - https://w3id.org/dpv/risk#RM7x7S3L1 + https://w3id.org/dpv/risk/owl/#RM7x7S4L4
    + https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -22021,7 +24611,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -22051,25 +24641,25 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S3L2RM7x7S4L5 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:3 L:2)High Risk (RM7x7 S:4 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L2
    - https://w3id.org/dpv/risk#RM7x7S3L2 + https://w3id.org/dpv/risk/owl/#RM7x7S4L5
    + https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + @@ -22100,7 +24690,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -22130,25 +24720,25 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S3L3RM7x7S4L6 Prefix risk-owl
    LabelLow Risk (RM7x7 S:3 L:3)Very High Risk (RM7x7 S:4 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L3
    - https://w3id.org/dpv/risk#RM7x7S3L3 + https://w3id.org/dpv/risk/owl/#RM7x7S4L6
    + https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + @@ -22179,7 +24769,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -22209,25 +24799,25 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S3L4RM7x7S4L7 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:3 L:4)Very High Risk (RM7x7 S:4 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L4
    - https://w3id.org/dpv/risk#RM7x7S3L4 + https://w3id.org/dpv/risk/owl/#RM7x7S4L7
    + https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + @@ -22258,7 +24848,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -22288,25 +24878,25 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S3L5RM7x7S5L1 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:3 L:5)Very Low Risk (RM7x7 S:5 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L5
    - https://w3id.org/dpv/risk#RM7x7S3L5 + https://w3id.org/dpv/risk/owl/#RM7x7S5L1
    + https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + @@ -22337,7 +24927,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -22367,25 +24957,25 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S3L6RM7x7S5L2 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:3 L:6)Low Risk (RM7x7 S:5 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L6
    - https://w3id.org/dpv/risk#RM7x7S3L6 + https://w3id.org/dpv/risk/owl/#RM7x7S5L2
    + https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + @@ -22416,7 +25006,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -22446,25 +25036,25 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S3L7RM7x7S5L3 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:3 L:7)Moderate Risk (RM7x7 S:5 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S3L7
    - https://w3id.org/dpv/risk#RM7x7S3L7 + https://w3id.org/dpv/risk/owl/#RM7x7S5L3
    + https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + @@ -22495,7 +25085,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -22525,25 +25115,25 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S4L1RM7x7S5L4 Prefix risk-owl
    LabelExtremely Low Risk (RM7x7 S:4 L:1)High Risk (RM7x7 S:5 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L1
    - https://w3id.org/dpv/risk#RM7x7S4L1 + https://w3id.org/dpv/risk/owl/#RM7x7S5L4
    + https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + @@ -22574,7 +25164,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -22604,25 +25194,25 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S4L2RM7x7S5L5 Prefix risk-owl
    LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:5 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L2
    - https://w3id.org/dpv/risk#RM7x7S4L2 + https://w3id.org/dpv/risk/owl/#RM7x7S5L5
    + https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -22653,7 +25243,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -22683,25 +25273,25 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S4L3RM7x7S5L6 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:4 L:3)Extremely High Risk (RM7x7 S:5 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L3
    - https://w3id.org/dpv/risk#RM7x7S4L3 + https://w3id.org/dpv/risk/owl/#RM7x7S5L6
    + https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + @@ -22732,7 +25322,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -22762,25 +25352,25 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S4L4RM7x7S5L7 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:4 L:4)Extremely High Risk (RM7x7 S:5 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L4
    - https://w3id.org/dpv/risk#RM7x7S4L4 + https://w3id.org/dpv/risk/owl/#RM7x7S5L7
    + https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + @@ -22811,7 +25401,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -22841,25 +25431,25 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S4L5RM7x7S6L1 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:4 L:5)Very Low Risk (RM7x7 S:6 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L5
    - https://w3id.org/dpv/risk#RM7x7S4L5 + https://w3id.org/dpv/risk/owl/#RM7x7S6L1
    + https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + @@ -22890,7 +25480,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -22920,25 +25510,25 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S4L6RM7x7S6L2 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:4 L:6)Moderate Risk (RM7x7 S:6 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L6
    - https://w3id.org/dpv/risk#RM7x7S4L6 + https://w3id.org/dpv/risk/owl/#RM7x7S6L2
    + https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + @@ -22969,7 +25559,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -22999,25 +25589,25 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S4L7RM7x7S6L3 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:4 L:7)High Risk (RM7x7 S:6 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S4L7
    - https://w3id.org/dpv/risk#RM7x7S4L7 + https://w3id.org/dpv/risk/owl/#RM7x7S6L3
    + https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + @@ -23048,7 +25638,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -23078,25 +25668,25 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S5L1RM7x7S6L4 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:5 L:1)Very High Risk (RM7x7 S:6 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L1
    - https://w3id.org/dpv/risk#RM7x7S5L1 + https://w3id.org/dpv/risk/owl/#RM7x7S6L4
    + https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + @@ -23127,7 +25717,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -23157,25 +25747,25 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S5L2RM7x7S6L5 Prefix risk-owl
    LabelLow Risk (RM7x7 S:5 L:2)Very High Risk (RM7x7 S:6 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L2
    - https://w3id.org/dpv/risk#RM7x7S5L2 + https://w3id.org/dpv/risk/owl/#RM7x7S6L5
    + https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + @@ -23206,7 +25796,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -23236,25 +25826,25 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S5L3RM7x7S6L6 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:5 L:3)Extremely High Risk (RM7x7 S:6 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L3
    - https://w3id.org/dpv/risk#RM7x7S5L3 + https://w3id.org/dpv/risk/owl/#RM7x7S6L6
    + https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + @@ -23285,7 +25875,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -23315,25 +25905,25 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S5L4RM7x7S6L7 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:5 L:4)Extremely High Risk (RM7x7 S:6 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L4
    - https://w3id.org/dpv/risk#RM7x7S5L4 + https://w3id.org/dpv/risk/owl/#RM7x7S6L7
    + https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + @@ -23364,7 +25954,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -23394,25 +25984,25 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S5L5RM7x7S7L1 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:5 L:5)Low Risk (RM7x7 S:7 L:1)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L5
    - https://w3id.org/dpv/risk#RM7x7S5L5 + https://w3id.org/dpv/risk/owl/#RM7x7S7L1
    + https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + @@ -23443,7 +26033,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -23473,25 +26063,25 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S5L6RM7x7S7L2 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:5 L:6)Moderate Risk (RM7x7 S:7 L:2)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L6
    - https://w3id.org/dpv/risk#RM7x7S5L6 + https://w3id.org/dpv/risk/owl/#RM7x7S7L2
    + https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + @@ -23522,7 +26112,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -23552,25 +26142,25 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S5L7RM7x7S7L3 Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:5 L:7)High Risk (RM7x7 S:7 L:3)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S5L7
    - https://w3id.org/dpv/risk#RM7x7S5L7 + https://w3id.org/dpv/risk/owl/#RM7x7S7L3
    + https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + @@ -23601,7 +26191,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -23631,25 +26221,25 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S6L1RM7x7S7L4 Prefix risk-owl
    LabelVery Low Risk (RM7x7 S:6 L:1)Very High Risk (RM7x7 S:7 L:4)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L1
    - https://w3id.org/dpv/risk#RM7x7S6L1 + https://w3id.org/dpv/risk/owl/#RM7x7S7L4
    + https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + @@ -23680,7 +26270,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -23710,25 +26300,25 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S6L2RM7x7S7L5 Prefix risk-owl
    LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:7 L:5)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L2
    - https://w3id.org/dpv/risk#RM7x7S6L2 + https://w3id.org/dpv/risk/owl/#RM7x7S7L5
    + https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + @@ -23759,7 +26349,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -23789,25 +26379,25 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S6L3RM7x7S7L6 Prefix risk-owl
    LabelHigh Risk (RM7x7 S:6 L:3)Extremely High Risk (RM7x7 S:7 L:6)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L3
    - https://w3id.org/dpv/risk#RM7x7S6L3 + https://w3id.org/dpv/risk/owl/#RM7x7S7L6
    + https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + @@ -23838,7 +26428,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -23868,25 +26458,28 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S6L4RM7x7S7L7 Prefix risk-owl
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:7 L:7)
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L4
    - https://w3id.org/dpv/risk#RM7x7S6L4 + https://w3id.org/dpv/risk/owl/#RM7x7S7L7
    + https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + @@ -23895,16 +26488,19 @@

    Very High Risk (RM7x7 S:6 L:5)

    - @@ -23917,29 +26513,35 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - + + + + - + + + + - + - + - +
    TermRM7x7S6L5RuleBasedSystemDesign Prefix risk-owl
    LabelVery High Risk (RM7x7 S:6 L:5)Rule-Based System Design
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L5
    - https://w3id.org/dpv/risk#RM7x7S6L5 + https://w3id.org/dpv/risk/owl/#RuleBasedSystemDesign
    + https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -23947,25 +26549,30 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + + + +
    +

    Sabotage

    - + - + @@ -23974,16 +26581,21 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -23996,14 +26608,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -24011,14 +26626,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + - +
    TermRM7x7S6L6Sabotage Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sabotage
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L6
    - https://w3id.org/dpv/risk#RM7x7S6L6 + https://w3id.org/dpv/risk/owl/#Sabotage
    + https://w3id.org/dpv/risk#Sabotage
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighConcept representing Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24026,25 +26644,28 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    + + + +
    +

    Sampling Bias

    - + - + @@ -24053,16 +26674,21 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - @@ -24075,29 +26701,32 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + - + + + + - + - + - +
    TermRM7x7S6L7SamplingBias Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:6 L:7)Sampling Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S6L7
    - https://w3id.org/dpv/risk#RM7x7S6L7 + https://w3id.org/dpv/risk/owl/#SamplingBias
    + https://w3id.org/dpv/risk#SamplingBias
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24105,25 +26734,29 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + + +
    +

    Scam

    - + - + @@ -24132,16 +26765,20 @@

    Low Risk (RM7x7 S:7 L:1)

    - @@ -24154,14 +26791,17 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + @@ -24169,14 +26809,17 @@

    Low Risk (RM7x7 S:7 L:1)

    - + + + + - +
    TermRM7x7S7L1Scam Prefix risk-owl
    LabelLow Risk (RM7x7 S:7 L:1)Scam
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L1
    - https://w3id.org/dpv/risk#RM7x7S7L1 + https://w3id.org/dpv/risk/owl/#Scam
    + https://w3id.org/dpv/risk#Scam
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:ConfidentialityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:MaliciousActivity + → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowConcept representing Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24184,25 +26827,30 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + + + +
    +

    Security Attack

    - + - + @@ -24211,16 +26859,20 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - @@ -24233,7 +26885,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -24244,18 +26896,12 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - - - - + + - - - - - +
    TermRM7x7S7L2SecurityAttack Prefix risk-owl
    LabelModerate Risk (RM7x7 S:7 L:2)Security Attack
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L2
    - https://w3id.org/dpv/risk#RM7x7S7L2 + https://w3id.org/dpv/risk/owl/#SecurityAttack
    + https://w3id.org/dpv/risk#SecurityAttack
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateConcept representing an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24263,25 +26909,31 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + + + + +
    +

    Security Breach

    - + - + @@ -24290,16 +26942,21 @@

    High Risk (RM7x7 S:7 L:3)

    - @@ -24312,14 +26969,17 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + @@ -24327,14 +26987,17 @@

    High Risk (RM7x7 S:7 L:3)

    - + + + + - +
    TermRM7x7S7L3SecurityBreach Prefix risk-owl
    LabelHigh Risk (RM7x7 S:7 L:3)Security Breach
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L3
    - https://w3id.org/dpv/risk#RM7x7S7L3 + https://w3id.org/dpv/risk/owl/#SecurityBreach
    + https://w3id.org/dpv/risk#SecurityBreach
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:ConfidentialityConcept + , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighConcept representing Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24342,25 +27005,28 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Selection Bias

    - + - + @@ -24369,16 +27035,20 @@

    Very High Risk (RM7x7 S:7 L:4)

    - @@ -24391,29 +27061,32 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + - + + + + - + - + - +
    TermRM7x7S7L4SelectionBias Prefix risk-owl
    LabelVery High Risk (RM7x7 S:7 L:4)Selection Bias
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L4
    - https://w3id.org/dpv/risk#RM7x7S7L4 + https://w3id.org/dpv/risk/owl/#SelectionBias
    + https://w3id.org/dpv/risk#SelectionBias
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource + , risk-owl:RiskConcept
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24421,25 +27094,33 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + + + + + + +
    +

    Service Alternative Offered

    - + - + @@ -24448,16 +27129,18 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - @@ -24470,7 +27153,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -24483,16 +27166,13 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - - - - + - +
    TermRM7x7S7L5ServiceAlternativeOffered Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:5)Service Alternative Offered
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L5
    - https://w3id.org/dpv/risk#RM7x7S7L5 + https://w3id.org/dpv/risk/owl/#ServiceAlternativeOffered
    + https://w3id.org/dpv/risk#ServiceAlternativeOffered
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24500,25 +27180,28 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    + + + +
    +

    Service Cost Increased

    - + - + @@ -24527,16 +27210,18 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - @@ -24549,7 +27234,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -24562,16 +27247,13 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - - - - + - +
    TermRM7x7S7L6ServiceCostIncreased Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:6)Service Cost Increased
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L6
    - https://w3id.org/dpv/risk#RM7x7S7L6 + https://w3id.org/dpv/risk/owl/#ServiceCostIncreased
    + https://w3id.org/dpv/risk#ServiceCostIncreased
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24579,25 +27261,28 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + +
    +

    Service Denied

    - + - + @@ -24606,16 +27291,18 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - @@ -24628,7 +27315,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -24641,16 +27328,13 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - - - - + - +
    TermRM7x7S7L7ServiceDenied Prefix risk-owl
    LabelExtremely High Risk (RM7x7 S:7 L:7)Service Denied
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RM7x7S7L7
    - https://w3id.org/dpv/risk#RM7x7S7L7 + https://w3id.org/dpv/risk/owl/#ServiceDenied
    + https://w3id.org/dpv/risk#ServiceDenied
    Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk
    Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-matrixRisk Risk-taxonomy
    @@ -24661,25 +27345,25 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    +
    +

    Service Limited

    - + - + @@ -24688,18 +27372,18 @@

    Rule-Based System Design

    - @@ -24712,32 +27396,23 @@

    Rule-Based System Design

    - + - - - - + - - - - + - + - - - - + @@ -24751,27 +27426,25 @@

    Rule-Based System Design

    - - -
    -

    Sabotage

    +
    +

    Service Not Provided

    TermRuleBasedSystemDesignServiceLimited Prefix risk-owl
    LabelRule-Based System DesignService Limited
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#RuleBasedSystemDesign
    - https://w3id.org/dpv/risk#RuleBasedSystemDesign + https://w3id.org/dpv/risk/owl/#ServiceLimited
    + https://w3id.org/dpv/risk#ServiceLimited
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:CognitiveBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designStub
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -24781,18 +27454,16 @@

    Sabotage

    - @@ -24806,32 +27477,23 @@

    Sabotage

    - + - - - - + - + - - - - - - - - + + @@ -24845,25 +27507,25 @@

    Sabotage

    -
    -

    Sampling Bias

    +
    +

    Service Partially Provided

    TermSabotageServiceNotProvided Prefix risk-owl
    LabelSabotageService Not Provided
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Sabotage
    - https://w3id.org/dpv/risk#Sabotage + https://w3id.org/dpv/risk/owl/#ServiceNotProvided
    + https://w3id.org/dpv/risk#ServiceNotProvided
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:IntegrityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes SabotageStub
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -24872,20 +27534,18 @@

    Sampling Bias

    - @@ -24898,29 +27558,23 @@

    Sampling Bias

    - + - - - - + - + - - - - + @@ -24934,26 +27588,25 @@

    Sampling Bias

    - -
    -

    Scam

    +
    +

    Service Provided

    TermSamplingBiasServicePartiallyProvided Prefix risk-owl
    LabelSampling BiasService Partially Provided
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SamplingBias
    - https://w3id.org/dpv/risk#SamplingBias + https://w3id.org/dpv/risk/owl/#ServicePartiallyProvided
    + https://w3id.org/dpv/risk#ServicePartiallyProvided
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:SelectionBias - → risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -24963,17 +27616,16 @@

    Scam

    - @@ -24987,32 +27639,23 @@

    Scam

    - + - - - - + - + - - - - - - - - + + @@ -25026,27 +27669,25 @@

    Scam

    - - -
    -

    Security Attack

    +
    +

    Service Provision Delayed

    TermScamServiceProvided Prefix risk-owl
    LabelScamService Provided
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#Scam
    - https://w3id.org/dpv/risk#Scam + https://w3id.org/dpv/risk/owl/#ServiceProvided
    + https://w3id.org/dpv/risk#ServiceProvided
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:ConfidentialityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:MaliciousActivity - → risk-owl:ExternalSecurityThreat + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes ScamStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -25056,17 +27697,16 @@

    Security Attack

    - @@ -25080,7 +27720,7 @@

    Security Attack

    - + @@ -25091,7 +27731,10 @@

    Security Attack

    - + + + + @@ -25107,28 +27750,106 @@

    Security Attack

    +
    +

    Service Quality Reduced

    +
    TermSecurityAttackServiceProvisionDelayed Prefix risk-owl
    LabelSecurity AttackService Provision Delayed
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SecurityAttack
    - https://w3id.org/dpv/risk#SecurityAttack + https://w3id.org/dpv/risk/owl/#ServiceProvisionDelayed
    + https://w3id.org/dpv/risk#ServiceProvisionDelayed
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:ConfidentialityConcept - , risk-owl:IntegrityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itStub
    Date Created2024-10-21
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceQualityReducedPrefixrisk-owl
    LabelService Quality Reduced
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ServiceQualityReduced
    + https://w3id.org/dpv/risk#ServiceQualityReduced +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    -
    -

    Security Breach

    + + + + +
    +

    None

    - + - + @@ -25138,18 +27859,15 @@

    Security Breach

    - @@ -25163,32 +27881,23 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + @@ -25202,25 +27911,25 @@

    Security Breach

    -
    -

    Selection Bias

    +
    +

    Service Security Reduced

    TermSecurityBreachServiceRelatedConsequence Prefix risk-owl
    LabelSecurity BreachNone
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SecurityBreach
    - https://w3id.org/dpv/risk#SecurityBreach + https://w3id.org/dpv/risk/owl/#ServiceRelatedConsequence
    + https://w3id.org/dpv/risk#ServiceRelatedConsequence
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept - , risk-owl:ConfidentialityConcept - , risk-owl:IntegrityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:OrganisationalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Security BreachA consequence related to the provision of a service
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    - + - + @@ -25229,19 +27938,18 @@

    Selection Bias

    - @@ -25254,29 +27962,23 @@

    Selection Bias

    - + - - - - + - + - - - - + @@ -25290,6 +27992,82 @@

    Selection Bias

    +
    +

    Service Termination

    +
    TermSelectionBiasServiceSecurityReduced Prefix risk-owl
    LabelSelection BiasService Security Reduced
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SelectionBias
    - https://w3id.org/dpv/risk#SelectionBias + https://w3id.org/dpv/risk/owl/#ServiceSecurityReduced
    + https://w3id.org/dpv/risk#ServiceSecurityReduced
    Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk - , risk-owl:PotentialRiskSource - , risk-owl:RiskConcept
    Sub-class of risk-owl:StatisticalBias - → risk-owl:DataBias - → risk-owl:Bias - → risk-owl:RiskConcept + risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceTerminationPrefixrisk-owl
    LabelService Termination
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ServiceTermination
    + https://w3id.org/dpv/risk#ServiceTermination +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:ServiceRelatedConsequence + → risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + @@ -25333,12 +28111,7 @@

    Sex Discrimination

    Sub-class of risk-owl:Sexism → risk-owl:Discrimination - → risk-owl:RiskConcept - - Sub-class of - risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:SocietalRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -25419,11 +28192,7 @@

    Sexism

    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept - - Sub-class of - risk-owl:Discrimination - → risk-owl:SocietalRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -25505,6 +28274,8 @@

    Sexual Harassment

    Sub-class of risk-owl:Harm → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept @@ -25578,11 +28349,7 @@

    SexualOrientation Discrimination

    Sub-class of risk-owl:Discrimination - → risk-owl:RiskConcept - - Sub-class of - risk-owl:Discrimination - → risk-owl:SocietalRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -25664,6 +28431,8 @@

    Sexual Violence

    Sub-class of risk-owl:Harm → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept @@ -25676,7 +28445,7 @@

    Sexual Violence

    Definition - Something that acts as or causes Sexual Violence + Concept representing Sexual Violence @@ -25755,7 +28524,7 @@

    Share Risk

    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl @@ -25837,7 +28606,8 @@

    Simpson'S Paradox Bias

    Sub-class of risk-owl:DataBias → risk-owl:Bias - → risk-owl:RiskConcept + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept @@ -25922,7 +28692,8 @@

    Social Disadvantage

    Sub-class of - risk-owl:SocietalRisk + risk-owl:GroupRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -25936,7 +28707,7 @@

    Social Disadvantage

    Definition - Something that acts as or causes Social Disadvantage + Concept representing Social Disadvantage @@ -26010,7 +28781,8 @@

    Societal Bias

    Sub-class of risk-owl:CognitiveBias → risk-owl:Bias - → risk-owl:RiskConcept + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept @@ -26095,7 +28867,8 @@

    Societal Health & Safety

    Sub-class of - risk-owl:SocietalRisk + risk-owl:GroupRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept @@ -26133,25 +28906,26 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + +
    +

    Societal Risk Concept

    - + - + @@ -26164,6 +28938,7 @@

    Societal Risk

    , risk-owl:PotentialConsequence , risk-owl:PotentialImpact , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource @@ -26182,9 +28957,12 @@

    Societal Risk

    - + - + + + + @@ -26193,7 +28971,10 @@

    Societal Risk

    - + + + + @@ -26249,7 +29030,7 @@

    Source Control

    @@ -26335,6 +29116,7 @@

    Spoofing

    @@ -26348,7 +29130,7 @@

    Spoofing

    - + @@ -26425,7 +29207,8 @@

    Statistical Bias

    @@ -26513,6 +29296,7 @@

    System Failure

    @@ -26526,7 +29310,7 @@

    System Failure

    - + @@ -26610,6 +29394,7 @@

    System Intrusion

    @@ -26623,7 +29408,7 @@

    System Intrusion

    - + @@ -26663,25 +29448,120 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    System Malfunction

    +
    TermSocietalRiskSocietalRiskConcept Prefix risk-owl
    LabelSocietal RiskSocietal Risk Concept
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SocietalRisk
    - https://w3id.org/dpv/risk#SocietalRisk + https://w3id.org/dpv/risk/owl/#SocietalRiskConcept
    + https://w3id.org/dpv/risk#SocietalRiskConcept
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societyRisk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process
    Usage NoteSocietal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure
    Date Created2024-10-21
    in Range of dpv-owl:hasTechnicalOrganisationalMeasure, dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + risk-owl:hasControl
    Sub-class of risk-owl:MaliciousActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes SpoofingConcept representing Spoofing
    Sub-class of risk-owl:DataBias → risk-owl:Bias - → risk-owl:RiskConcept + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept
    Sub-class of risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes System FailureConcept representing System Failure
    Usage Note Sub-class of risk-owl:SecurityAttack → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes System IntrusionConcept representing System Intrusion
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermSystemMalfunctionPrefixrisk-owl
    LabelSystem Malfunction
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#SystemMalfunction
    + https://w3id.org/dpv/risk#SystemMalfunction +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:AvailabilityConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk + , risk-owl:PotentialRiskSource +
    Sub-class of risk-owl:OperationalSecurityRisk + → risk-owl:TechnicalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionConcept representing System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented inRisk Risk-taxonomy
    +
    + + + + + + + +
    +

    Technical Risk Concept

    - + - + @@ -26691,8 +29571,8 @@

    System Malfunction

    @@ -26700,8 +29580,7 @@

    System Malfunction

    - @@ -26714,35 +29593,26 @@

    System Malfunction

    - + - + - - - - + - + - - - - - - - - + + @@ -26792,7 +29662,8 @@

    Terrorism

    - @@ -26806,7 +29677,7 @@

    Terrorism

    - + @@ -27038,12 +29909,7 @@

    Transphobia

    - - @@ -27131,6 +29997,7 @@

    Unauthorised Access to Premises

    @@ -27144,7 +30011,7 @@

    Unauthorised Access to Premises

    - + @@ -27226,6 +30093,7 @@

    Unauthorised Activity

    @@ -27239,7 +30107,7 @@

    Unauthorised Activity

    - + @@ -27308,6 +30176,7 @@

    Unauthorised Code Access

    @@ -27321,7 +30190,7 @@

    Unauthorised Code Access

    - + @@ -27400,6 +30269,7 @@

    Unauthorised Code Disclosure

    @@ -27413,7 +30283,7 @@

    Unauthorised Code Disclosure

    - + @@ -27492,6 +30362,7 @@

    Unauthorised Code Modification

    @@ -27505,7 +30376,7 @@

    Unauthorised Code Modification

    - + @@ -27584,6 +30455,7 @@

    Unauthorised Data Access

    @@ -27597,7 +30469,7 @@

    Unauthorised Data Access

    - + @@ -27676,6 +30548,7 @@

    Unauthorised Data Disclosure

    @@ -27689,7 +30562,7 @@

    Unauthorised Data Disclosure

    - + @@ -27768,6 +30641,7 @@

    Unauthorised Data Modification

    @@ -27781,7 +30655,7 @@

    Unauthorised Data Modification

    - + @@ -27860,6 +30734,7 @@

    Unauthorised Information Disclosure

    @@ -27873,7 +30748,7 @@

    Unauthorised Information Disclosure

    - + @@ -27952,6 +30827,7 @@

    Unauthorised Re-Identification

    @@ -27965,7 +30841,7 @@

    Unauthorised Re-Identification

    - + @@ -28041,6 +30917,7 @@

    Unauthorised Resource Use

    @@ -28054,7 +30931,7 @@

    Unauthorised Resource Use

    - + @@ -28135,6 +31012,7 @@

    Unauthorised System Access

    @@ -28148,7 +31026,7 @@

    Unauthorised System Access

    - + @@ -28227,6 +31105,7 @@

    Unauthorised System Modification

    @@ -28240,7 +31119,7 @@

    Unauthorised System Modification

    - + @@ -28321,6 +31200,7 @@

    Unwanted Code Deletion

    @@ -28334,7 +31214,7 @@

    Unwanted Code Deletion

    - + @@ -28415,6 +31295,7 @@

    Unwanted Data Deletion

    @@ -28428,7 +31309,7 @@

    Unwanted Data Deletion

    - + @@ -28507,6 +31388,7 @@

    Unwanted Disclosure of Data

    @@ -28520,7 +31402,7 @@

    Unwanted Disclosure of Data

    - + @@ -28593,7 +31475,8 @@

    User Risks

    - @@ -29195,7 +32078,9 @@

    Violating Code of Conduct

    - @@ -29208,7 +32093,7 @@

    Violating Code of Conduct

    - + @@ -29250,7 +32135,7 @@

    Violating Code of Conduct

    -

    Violation of Contractual Obligation

    +

    Violating Contractual Obligation

    TermSystemMalfunctionTechnicalRiskConcept Prefix risk-owl
    LabelSystem MalfunctionTechnical Risk Concept
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#SystemMalfunction
    - https://w3id.org/dpv/risk#SystemMalfunction + https://w3id.org/dpv/risk/owl/#TechnicalRiskConcept
    + https://w3id.org/dpv/risk#TechnicalRiskConcept
    rdfs:Class , owl:Class , dpv-owl:RiskConcept - , risk-owl:AvailabilityConcept , risk-owl:PotentialConsequence + , risk-owl:PotentialImpact , risk-owl:PotentialRisk , risk-owl:PotentialRiskSource
    Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionRisk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process
    Usage NoteHere system refers to both hardware and software systemsTechnical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Documented in Risk Risk-taxonomy
    Sub-class of risk-owl:SocietalRisk + risk-owl:GroupRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes TerrorismConcept representing Terrorism
    Sub-class of risk-owl:Sexism → risk-owl:Discrimination - → risk-owl:RiskConcept -
    Sub-class of risk-owl:Sexism - → risk-owl:Discrimination - → risk-owl:SocietalRisk + → risk-owl:SocietalRiskConcept → dpv-owl:RiskConcept
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesConcept representing Unauthorised Access to Premises
    Sub-class of risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcept representing Unauthorised Activity
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code AccessConcept representing Unauthorised Code Access
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureConcept representing Unauthorised Code Disclosure
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code ModificationConcept representing Unauthorised Code Modification
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data AccessConcept representing Unauthorised Data Access
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureConcept representing Unauthorised Data Disclosure
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data ModificationConcept representing Unauthorised Data Modification
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureConcept representing Unauthorised Information Disclosure
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationConcept representing Unauthorised Re-Identification
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Resource UseConcept representing Unauthorised Resource Use
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System AccessConcept representing Unauthorised System Access
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System ModificationConcept representing Unauthorised System Modification
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Code DeletionConcept representing Unwanted Code Deletion
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Data DeletionConcept representing Unwanted Data Deletion
    Sub-class of risk-owl:UnauthorisedActivity → risk-owl:ExternalSecurityThreat + → risk-owl:TechnicalRiskConcept → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataConcept representing Unwanted Disclosure of Data
    Sub-class of dpv-owl:RiskConcept + risk-owl:OrganisationalRiskConcept + → dpv-owl:RiskConcept
    Sub-class of risk-owl:ViolatingObligation + risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Code of ConductConcept representing Violation of Code of Conduct
    Usage Note
    @@ -29261,7 +32146,7 @@

    Violation of Contractual Obligation

    - + @@ -29284,7 +32169,15 @@

    Violation of Contractual Obligation

    - + + @@ -29297,7 +32190,7 @@

    Violation of Contractual Obligation

    - + @@ -29373,7 +32266,9 @@

    Violating Ethics Code

    - @@ -29386,7 +32281,7 @@

    Violating Ethics Code

    - + @@ -29428,7 +32323,7 @@

    Violating Ethics Code

    -

    Violation of Legal Obligations

    +

    Violating Legal Obligation

    LabelViolation of Contractual ObligationViolating Contractual Obligation
    IRI (owl)
    IRI (canonical)
    Sub-class of risk-owl:ViolatingObligation + risk-owl:LegalComplianceRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    Sub-class of risk-owl:ViolatingObligation + → risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsConcept representing Violation of Contractual Obligations
    Usage Note
    Sub-class of risk-owl:ViolatingObligation + risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Ethics CodeConcept representing Violation of Ethics Code
    Usage Note
    @@ -29439,7 +32334,7 @@

    Violation of Legal Obligations

    - + @@ -29462,7 +32357,15 @@

    Violation of Legal Obligations

    - + + @@ -29475,7 +32378,7 @@

    Violation of Legal Obligations

    - + @@ -29516,6 +32419,85 @@

    Violation of Legal Obligations

    +
    +

    Violating Obligation

    +
    LabelViolation of Legal ObligationsViolating Legal Obligation
    IRI (owl)
    IRI (canonical)
    Sub-class of risk-owl:ViolatingObligation + risk-owl:LegalComplianceRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    Sub-class of risk-owl:ViolatingObligation + → risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Legal ObligationsConcept representing Violation of Legal Obligations
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingObligationPrefixrisk-owl
    LabelViolating Obligation
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingObligation
    + https://w3id.org/dpv/risk#ViolatingObligation +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + +

    Violating Policy

    @@ -29551,7 +32533,9 @@

    Violating Policy

    - @@ -29564,7 +32548,7 @@

    Violating Policy

    - + @@ -29590,8 +32574,87 @@

    Violating Policy

    +
    +

    Violating Prohibition

    +
    Sub-class of risk-owl:ViolatingObligation + risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policyConcept representing violation of policy which can be either internal or external policy
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingProhibitionPrefixrisk-owl
    LabelViolating Prohibition
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#ViolatingProhibition
    + https://w3id.org/dpv/risk#ViolatingProhibition +
    Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept + , risk-owl:PotentialConsequence + , risk-owl:PotentialRisk +
    Sub-class of risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    DefinitionSomething that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    Documented inRisk Risk-taxonomy
    +
    + + + + +
    -

    Violation of Statutory Obligations

    +

    Violating Statutory Obligations

    @@ -29602,7 +32665,7 @@

    Violation of Statutory Obligations

    - + @@ -29625,7 +32688,15 @@

    Violation of Statutory Obligations

    - + + @@ -29638,7 +32709,7 @@

    Violation of Statutory Obligations

    - + @@ -29718,6 +32789,8 @@

    Violence against children

    @@ -29730,7 +32803,7 @@

    Violence against children

    - + @@ -30092,75 +33165,79 @@

    caused by threat

    -
    -

    caused by vulnerability

    -
    LabelViolation of Statutory ObligationsViolating Statutory Obligations
    IRI (owl)
    IRI (canonical)
    Sub-class of risk-owl:ViolatingObligation + risk-owl:LegalComplianceRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept +
    Sub-class of risk-owl:ViolatingObligation + → risk-owl:PolicyRisk + → risk-owl:LegalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Violation of Statutory ObligationsConcept representing Violation of Statutory Obligations
    Usage Note Sub-class of risk-owl:Harm → risk-owl:IndividualRisk + → risk-owl:SocietalRiskConcept + → dpv-owl:RiskConcept
    DefinitionSomething that acts as or causes Child ViolenceConcept representing Child Violence
    Usage Note
    - - - - - - - - - - - - - - - - - - - - - - +
    +

    caused by vulnerability

    +
    TermcausedByVulnerabilityPrefixrisk-owl
    Labelcaused by vulnerability
    IRI (owl)
    IRI (canonical)
    - https://w3id.org/dpv/risk/owl/#causedByVulnerability
    - https://w3id.org/dpv/risk#causedByVulnerability -
    Type rdf:Property - , owl:Class -
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByVulnerabilityPrefixrisk-owl
    Labelcaused by vulnerability
    IRI (owl)
    IRI (canonical)
    + https://w3id.org/dpv/risk/owl/#causedByVulnerability
    + https://w3id.org/dpv/risk#causedByVulnerability +
    Type rdf:Property + , owl:Class +
    Range includes risk-owl:Vulnerability +
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    Documented inRisk Core
    +
    + + - - - - - - Range includes - risk-owl:Vulnerability - - - - - - Definition - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - - - - - - - - - - Date Created - 2024-02-14 - - - - - Documented in - Risk Core - - - -
    @@ -30246,12 +33323,32 @@

    caused by vulnerability

    + + + + + + + + + + + + + + + + + + + + + + - - @@ -30538,6 +33635,18 @@

    exploits vulnerability

    + + + + + + + + + + + + @@ -30619,7 +33728,7 @@

    has control

    Documented in - Risk Core + Dex Core @@ -30970,6 +34079,48 @@

    has vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -31083,6 +34234,7 @@

    has vulnerability

    +
    @@ -31475,6 +34627,61 @@

    is vulnerability of

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -31676,10 +34883,100 @@

    refers to risk

    - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -32613,6 +35910,12 @@

    External

    + + + + + + @@ -32631,6 +35934,12 @@

    External

    + + + + + + @@ -32645,6 +35954,7 @@

    External

    + @@ -32663,6 +35973,17 @@

    External

    + + + + + + + + + + + @@ -32765,6 +36086,18 @@

    External

    + + + + + + + + + + + + @@ -32852,6 +36185,12 @@

    External

    + + + + + + @@ -32863,6 +36202,42 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -32934,6 +36309,7 @@

    External

    + @@ -33015,6 +36391,7 @@

    External

    + @@ -33048,12 +36425,36 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + @@ -33165,6 +36566,7 @@

    External

    + @@ -33183,6 +36585,11 @@

    External

    + + + + + @@ -33196,6 +36603,24 @@

    External

    + + + + + + + + + + + + + + + + + + @@ -33236,6 +36661,12 @@

    External

    + + + + + + @@ -33713,6 +37144,78 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -33743,6 +37246,7 @@

    External

    + @@ -33788,6 +37292,13 @@

    External

    + + + + + + + @@ -33965,6 +37476,16 @@

    External

    + + + + + + + + + + diff --git a/2.1-dev/risk/risk-owl.jsonld b/2.1-dev/risk/risk-owl.jsonld index 574e557dd..daebcbeb5 100644 --- a/2.1-dev/risk/risk-owl.jsonld +++ b/2.1-dev/risk/risk-owl.jsonld @@ -1,14 +1,25 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18,7 +29,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -30,25 +41,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -62,15 +69,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -80,7 +81,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -92,50 +93,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -143,7 +120,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -155,37 +132,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.36,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -195,7 +161,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -207,24 +173,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -247,7 +213,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N809a964650274e1ca9c544fb513732ef" + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -257,7 +223,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -269,37 +235,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Concept representing Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Fraud" } ] }, { - "@id": "_:N809a964650274e1ca9c544fb513732ef", + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk/owl#ErroneousUse", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -313,9 +282,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.57,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -325,7 +300,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -337,26 +312,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Concept representing erroneous use (of something)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Erroneous Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -364,7 +362,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -376,25 +374,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -416,7 +414,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Neee39564ca4e493181200a260513b3de" + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -426,30 +424,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Concept representing Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Neee39564ca4e493181200a260513b3de", + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1", "@type": [ "https://schema.org/WebPage" ], @@ -465,14 +469,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -494,7 +496,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" + "@id": "_:Na263f2c7d5914d86a7568447eb141586" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -504,51 +506,58 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Concept representing Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", + "@id": "_:Na263f2c7d5914d86a7568447eb141586", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -571,7 +580,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -581,7 +590,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -593,46 +602,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Concept representing Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Phishing Scam" } ] }, { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DisabilityDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -642,7 +662,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -654,40 +674,69 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on physical or mental disabilities" + "@value": "Concept representing Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Disability Discrimination" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -697,7 +746,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -709,48 +758,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N366da704654a4b4682d8de807d0f1bef" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -760,7 +808,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -772,37 +820,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:N366da704654a4b4682d8de807d0f1bef", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -813,12 +845,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -828,7 +860,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -840,26 +875,45 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.40,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -867,7 +921,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -876,38 +930,40 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBias", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -917,7 +973,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Bias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -929,26 +985,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Bias" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.44,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -956,7 +1025,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -968,25 +1037,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1008,7 +1076,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1018,7 +1086,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1030,46 +1098,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Concept representing Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" + "@value": "Exposure to Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1084,15 +1148,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N95204127ed924036926f89eb7e5b0678" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1102,7 +1160,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1114,53 +1172,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "_:N95204127ed924036926f89eb7e5b0678", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-08-16" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.75,xsd:decimal" + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1170,13 +1222,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1188,51 +1234,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Concept representing Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Authorisation Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISa Trust Services Security Incidents 2021" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1242,73 +1279,38 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#RightsObstructed", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.14,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1316,7 +1318,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1328,21 +1330,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Rights Obstructed" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1356,9 +1367,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nae5245156caa4c27aeb793246d56954e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1368,7 +1385,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1380,24 +1397,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Concept representing Terrorism" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Terrorism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "_:Nae5245156caa4c27aeb793246d56954e", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@type": [ + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1419,7 +1453,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" + "@id": "_:N4f06055416a84591bbecd622054f617d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1429,7 +1463,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1441,18 +1475,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", + "@id": "_:N4f06055416a84591bbecd622054f617d", "@type": [ "https://schema.org/WebPage" ], @@ -1468,19 +1502,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -1494,6 +1524,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -1503,53 +1538,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", "@type": [ + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1557,7 +1568,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1569,57 +1580,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + "@value": "Concept representing Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Aggregation Bias" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@value": "Georg P. Krog" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1629,7 +1625,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1641,39 +1637,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Concept representing Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1681,7 +1664,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1690,30 +1673,17 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1724,26 +1694,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1753,7 +1704,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1765,36 +1716,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Integrity Concept" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -1806,12 +1747,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.80,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1821,7 +1757,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1833,21 +1769,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1863,7 +1799,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1885,21 +1821,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1910,7 +1846,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1920,7 +1856,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1932,32 +1868,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1967,7 +1897,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1979,37 +1909,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.44,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2019,7 +1953,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2031,21 +1965,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2059,9 +1996,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2071,7 +2014,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2083,40 +2026,73 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Concept representing Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AgeDiscrimination", + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1abbefd32bc845a7880d7b75d2794630" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2128,46 +2104,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's age, often impacting older or younger individuals" + "@value": "Concept representing Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Age Discrimination" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "_:N1abbefd32bc845a7880d7b75d2794630", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - }, + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExcellenceDiscrimination", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2177,10 +2153,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2192,30 +2165,33 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" - }, - { - "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2223,7 +2199,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Misuse" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2235,32 +2211,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Risk Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2268,11 +2248,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2282,24 +2257,33 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "has risk source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2321,7 +2305,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" + "@id": "_:N415855303c6a4ae18e62e54d5a894a07" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2331,36 +2315,39 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Concept representing Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" + "@value": "Violating Contractual Obligation" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", + "@id": "_:N415855303c6a4ae18e62e54d5a894a07", "@type": [ "https://schema.org/WebPage" ], @@ -2376,51 +2363,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Incident Concluding Report" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2431,12 +2377,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2446,7 +2392,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2458,26 +2404,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk/owl#ServiceProvided", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2487,7 +2443,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2499,25 +2455,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Service Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2528,18 +2480,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" + "@id": "_:N47d4f59132ee43c7a1a7cdfb728f2362" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2549,7 +2495,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2561,41 +2507,2128 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Risk Matrix" } ] }, { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", + "@id": "_:N47d4f59132ee43c7a1a7cdfb728f2362", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Daniel Doherty" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Rob Brennan" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@type": [ + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalSupportLimited", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Support Limited" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM7x7 S:3 L:4)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Misogyny", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Sexism" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Dislike, contempt, or prejudice against women" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Misogyny" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Concluded" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:1 L:7)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReverseDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reverse Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM7x7 S:6 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndfdabe58832a445293583eabfe4518fb" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unwanted Code Deletion" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unwanted Code Deletion" + } + ] + }, + { + "@id": "_:Ndfdabe58832a445293583eabfe4518fb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Suspected" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.60,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM5x5 S:3 L:5)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Mitigation Measure" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM5x5 S:3 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Share Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Information Disclosure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Information Disclosure" + } + ] + }, + { + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" + } + ] + }, + { + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM7x7 S:2 L:7)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM5x5 S:3 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM7x7 S:4 L:6)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Simpson'S Paradox Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reward" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unwanted Disclosure of Data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unwanted Disclosure of Data" + } + ] + }, + { + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Source" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduce Severity" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk Mitigation Measure that controls the Consequences" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Consequence Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CasteDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Caste Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsDenied", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The refusal or withholding or denial of the existence or applicability of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rights Denied" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Misuse" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept represent an intentional misuse (of something)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Intentional Misuse" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@type": [ + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing System Intrusion" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "System Intrusion" + } + ] + }, + { + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Coverage Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2609,15 +4642,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2627,7 +4654,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2639,52 +4666,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" - } - ] - }, - { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2696,30 +4707,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Concept representing an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2733,15 +4735,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2751,7 +4747,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2763,57 +4759,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "0.10,xsd:decimal" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2825,31 +4811,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2860,12 +4840,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.40,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2875,7 +4856,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2887,32 +4868,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Concept representing Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolated", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2922,7 +4918,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2934,57 +4930,79 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Rights Violated" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk/owl#Misuse" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@language": "en", + "@value": "Concept representing accidental misuse (of something)" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2992,7 +5010,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3004,21 +5022,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3029,12 +5050,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7acfc235cc254becbaba265d4ea9494e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3044,13 +5071,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3062,43 +5083,77 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Concept representing Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" + "@value": "Cryptojacking" } + ] + }, + { + "@id": "_:N7acfc235cc254becbaba265d4ea9494e", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.33,xsd:decimal" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ServiceSecurityReduced", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3108,7 +5163,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3120,39 +5175,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Service Security Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3160,7 +5200,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3172,30 +5212,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misandry", + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3205,33 +5262,57 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against men" + "@value": "Concept representing Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misandry" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3242,12 +5323,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na801ef084cf6488facf5802801e4ce8b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3257,13 +5344,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3275,247 +5356,228 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Concept representing Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "_:Na801ef084cf6488facf5802801e4ce8b", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "https://schema.org/name": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "https://schema.org/url": [ { - "@id": "http://www.w3.org/2002/07/owl" + "@value": "https://www.iso.org/standard/75281.html" } - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Julio Fernandez" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Delaram Golpayegani" - }, + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ { - "@value": "Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@value": "0.25,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Julian Flake" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "Delaram Golpayegani" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@language": "en", - "@value": "Beatriz Esteves" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { - "@language": "en", - "@value": "Rob Brennan" - }, + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Paul Ryan" + "@value": "Level where Risk is Low" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "Low Risk" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://w3id.org/dpv/risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2022-08-14" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "2024-08-18" + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "10.5281/zenodo.12505841" + "@language": "en", + "@value": "Concept representing Loss of Credibility" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "Lose of Credibility" } + ] + }, + { + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09", + "@type": [ + "https://schema.org/WebPage" ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "https://schema.org/name": [ { - "@value": "risk" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "https://schema.org/url": [ { - "@value": "https://w3id.org/dpv/risk#" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "RISK" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/owl" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Control that monitors a Risk" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3534,7 +5596,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3544,7 +5606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3556,24 +5618,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3584,7 +5647,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3593,6 +5656,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3600,7 +5668,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3612,79 +5680,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Concept representing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.16,xsd:decimal" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3700,7 +5757,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3710,13 +5767,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3728,32 +5782,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Very High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3761,11 +5820,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3775,116 +5829,60 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "caused by threat" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "Legal Risk" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/primer", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.10,xsd:decimal" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "accepted" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3907,7 +5905,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3917,7 +5915,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3929,48 +5927,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Concept representing Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Identity Fraud" } ] }, { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@id": "https://w3id.org/dpv/risk/owl#PersonalisationEnabled", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3980,7 +5976,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3992,37 +5988,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Personalisation Enabled" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.67,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4032,7 +6017,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4044,21 +6029,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4069,7 +6054,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4079,7 +6069,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4091,37 +6081,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#ServiceTermination", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4131,7 +6114,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4143,21 +6126,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Service Termination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4168,12 +6150,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.22,xsd:decimal" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4183,7 +6160,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4195,41 +6172,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Availability Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-03-30" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4239,7 +6222,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4251,21 +6234,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + "@value": "Concept representing Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Selection Bias" + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4276,12 +6265,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4291,7 +6275,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4303,43 +6287,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4347,7 +6315,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4355,30 +6323,16 @@ "@language": "en", "@value": "accepted" } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Social Disadvantage" - } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4400,7 +6354,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4410,7 +6364,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4422,53 +6376,88 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Concept representing Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.86,xsd:decimal" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4478,7 +6467,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4490,24 +6479,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4518,18 +6504,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4539,7 +6519,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4551,53 +6537,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Low Severity" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#CustomerSupportLimited", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4607,7 +6576,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4619,32 +6588,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Concept representing customer support to be limited" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Customer Support Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4654,7 +6632,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Notice" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4666,26 +6644,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#DirectDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4695,7 +6677,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4707,25 +6689,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Direct Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4739,15 +6717,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nadd5922c22574bd38879939155a85ae3" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4757,7 +6729,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4769,37 +6741,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nadd5922c22574bd38879939155a85ae3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4810,12 +6766,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4825,7 +6781,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4837,49 +6793,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 20501:2019" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4887,7 +6819,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4899,25 +6831,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Statistical Bias" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk/owl#ServiceAlternativeOffered", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4925,7 +6864,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4937,49 +6876,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Service Alternative Offered" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4989,10 +6916,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5004,38 +6928,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToEstablishLegalClaims", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5045,7 +6961,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5057,46 +6973,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Inability to Establish Legal Claims" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "https://w3id.org/dpv/risk/owl#PotentialImpact", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-29" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5108,31 +7019,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" + "@value": "Potential Impact" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@language": "en", + "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5148,7 +7055,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5158,7 +7065,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5170,32 +7077,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5205,7 +7121,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5217,27 +7133,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5245,7 +7173,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5257,47 +7185,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5305,11 +7217,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5319,30 +7226,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Normality Bias" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GenderDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept", "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5352,7 +7265,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5364,32 +7277,33 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's gender identity or gender expression" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Gender Discrimination" + "@value": "Organisational Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Organisational in this context refers to an organisation which is not human but is managed by humans" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5399,7 +7313,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5411,37 +7325,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5451,7 +7354,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5463,27 +7366,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5494,12 +7391,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5509,10 +7406,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5524,24 +7418,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -5560,7 +7448,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5570,7 +7458,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5582,21 +7470,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5607,7 +7495,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5617,7 +7510,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5629,21 +7522,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5659,7 +7552,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5669,7 +7562,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5681,41 +7574,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5725,7 +7606,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5737,48 +7618,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + "@value": "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Informativeness Bias" + "@value": "Violating Obligation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5788,7 +7647,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5800,36 +7659,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -5841,7 +7684,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5851,7 +7694,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5863,41 +7706,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5907,7 +7740,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5919,27 +7752,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A limitation or restrictions on the scope or exercise of rights" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Societal Risk Concept" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5950,12 +7783,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5965,7 +7798,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5977,57 +7810,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6039,7 +7835,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6049,7 +7845,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6061,31 +7857,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6093,6 +7895,17 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6102,35 +7915,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" + "@value": "Moderate Likelihood" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LanguageDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6140,7 +7956,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6152,19 +7968,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Language Discrimination" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6176,7 +7993,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6186,7 +8008,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6198,37 +8026,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Concept" + "@value": "Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6236,6 +8065,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6245,26 +8079,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6278,9 +8110,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6290,7 +8128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6302,31 +8140,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Human Errors" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NationalityDiscrimination", + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SexualHarassment", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6335,7 +8183,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6344,23 +8192,16 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Discrimination based on a person's nationality or citizenship" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Nationality Discrimination" + "@value": "Sexual Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#PotentialConsequence", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6372,12 +8213,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6387,7 +8223,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6399,60 +8235,75 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" + "@value": "Potential Consequence" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#PersonalisationDisabled", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - HTML serialiation" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Personalisation Disabled" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6474,7 +8325,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6484,7 +8335,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6496,34 +8347,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Concept representing Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Lose of Goodwill" } ] }, { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -6542,7 +8393,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6564,21 +8415,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6592,9 +8480,23 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6604,7 +8506,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6616,21 +8518,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Concept representing Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Data Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6644,9 +8565,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.41,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6656,7 +8583,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6668,30 +8595,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Concept representing Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misogyny", + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6701,7 +8655,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6713,47 +8667,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against women" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misogyny" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9d18ac853d6249008536496d60a088cd" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6763,7 +8711,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6774,55 +8722,42 @@ ], "http://www.w3.org/2004/02/skos/core#definition": [ { - "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:N9d18ac853d6249008536496d60a088cd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@language": "en", + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Implicit Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6832,7 +8767,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6844,26 +8779,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Concept representing Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightEroded", + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6871,7 +8808,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6883,41 +8820,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The gradual weakening or reduction of the scope and protection of rights" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erosion of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -6926,6 +8856,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N889cd521927340be8913f31c0baa2b9b" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6933,7 +8868,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6945,23 +8883,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Concept representing Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Copyright Violation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "_:N889cd521927340be8913f31c0baa2b9b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -6984,7 +8939,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6994,7 +8949,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7006,48 +8961,64 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Concept representing Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Blackmail" } ] }, { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7057,7 +9028,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7069,32 +9040,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Concept representing Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7104,7 +9096,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7116,31 +9108,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", + "@id": "https://w3id.org/dpv/risk/owl#GeographicDiscrimination", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" - } + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7148,6 +9139,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7157,46 +9153,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Discrimination based on a person's geographical origin or residence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7206,7 +9193,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7218,46 +9205,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7267,52 +9235,35 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Cryptojacking" + "@value": "accepted" } - ] - }, - { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "ENISA Threat Landscape 2021" + "@language": "en", + "@value": "Control to recover from event" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@language": "en", + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsDenial", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7322,7 +9273,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7334,53 +9285,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The refusal or withholding or denial of the existence or applicability of rights" + "@value": "Concept representing violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#Bias", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7390,7 +9329,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7402,40 +9341,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7449,15 +9369,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7467,7 +9381,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7479,57 +9393,61 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", + "@id": "https://w3id.org/dpv/risk/owl#RacialDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7539,7 +9457,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#Racism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7551,21 +9469,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + "@value": "Discrimination against individuals because of their racial background or skin color" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confirmation Bias" + "@value": "Racial Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7576,12 +9494,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7591,7 +9504,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7603,30 +9516,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReverseDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7636,7 +9549,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7648,26 +9561,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reverse Discrimination" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7689,7 +9603,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7699,7 +9613,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7711,37 +9625,93 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Concept representing Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Security Breach" } ] }, { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Statistical Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7752,12 +9722,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7767,7 +9732,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7779,36 +9744,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7816,6 +9782,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7825,33 +9796,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -7863,18 +9821,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7884,7 +9831,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7896,53 +9843,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" - } - ] - }, - { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7952,7 +9887,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7964,37 +9899,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Concept representing Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "https://w3id.org/dpv/risk/owl#DataBias", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.75,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8004,13 +9943,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8022,47 +9955,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8070,11 +9987,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8084,30 +9996,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confounding Variables Bias" + "@value": "has incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Homophobia", + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8117,7 +10036,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8129,37 +10048,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Homophobia" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.37,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8169,7 +10077,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8181,23 +10089,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RacialDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#Sexism", "@type": [ "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], @@ -8214,7 +10122,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Racism" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8226,37 +10134,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals because of their racial background or skin color" + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Racial Discrimination" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8264,11 +10171,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8278,19 +10180,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8302,7 +10215,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8312,7 +10230,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8324,32 +10242,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Concept" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Threat", + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8359,7 +10276,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8371,32 +10288,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Technical Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8406,7 +10338,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8418,65 +10350,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Non-Response Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#ServiceProvisionDelayed", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Individual Health & Safety" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", - "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8486,7 +10383,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8498,41 +10395,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Service Provision Delayed" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8542,7 +10430,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8554,21 +10442,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Simpson'S Paradox Bias" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8579,12 +10467,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.10,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8594,7 +10477,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8606,21 +10489,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8631,7 +10514,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8641,7 +10524,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8653,34 +10536,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8688,7 +10563,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8700,30 +10575,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EthnicDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8733,7 +10615,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Racism" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8745,37 +10627,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ethnic Discrimination" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.20,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8785,7 +10671,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8797,41 +10683,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8841,7 +10712,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Bias" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8853,30 +10724,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cognitive Bias" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndirectDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6f377135bda24668a1071c5670204b53" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8886,7 +10773,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8898,21 +10785,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" + "@value": "Concept representing Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Indirect Discrimination" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "_:N6f377135bda24668a1071c5670204b53", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8928,7 +10831,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8938,10 +10841,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8953,38 +10853,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" + "@value": "Extremely High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToFulfillLegalObligations", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8994,7 +10892,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9006,25 +10904,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Inability to Fulfill Legal Obligations" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9035,18 +10929,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9056,7 +10939,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9068,44 +10951,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@id": "https://w3id.org/dpv/risk/owl#ServiceNotProvided", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9113,7 +10984,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9125,39 +10996,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Service Not Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9165,7 +11023,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9177,24 +11035,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Risks and issues that affect or have the potential to affect groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9216,7 +11076,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9226,7 +11086,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9238,18 +11098,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Concept representing Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8", "@type": [ "https://schema.org/WebPage" ], @@ -9265,14 +11125,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9286,15 +11142,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9304,7 +11154,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9316,57 +11166,79 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to remedy consequences of event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9376,7 +11248,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9388,41 +11260,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9432,7 +11295,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9444,52 +11307,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rule-Based System Design" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#GenderDiscrimination", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6177ab61947545c3b0f993f924c70c28" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9499,7 +11340,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9511,59 +11352,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N6177ab61947545c3b0f993f924c70c28", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9573,7 +11385,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OrganisationalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9585,26 +11397,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "A consequence related to the provision of a service" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9626,7 +11433,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1" + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9636,7 +11443,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9648,42 +11455,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Concept representing Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1", + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", + "@id": "https://w3id.org/dpv/risk/owl#ServiceDenied", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9691,7 +11504,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9703,30 +11516,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Service Denied" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sexism", + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9736,7 +11551,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9748,41 +11563,94 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexism" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#InabilityToProvideHealthCare", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9792,7 +11660,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9804,25 +11672,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coverage Bias" + "@value": "Inability to Provide Health Care" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9832,7 +11699,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9844,43 +11711,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingProhibition", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9890,7 +11743,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9902,33 +11755,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Violating Prohibition" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9938,7 +11795,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9950,27 +11807,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9992,7 +11846,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nedb073eb260845019e04df25c90d654e" + "@id": "_:N877aeaa00e28404d96212fa2798843da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10002,7 +11856,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10014,18 +11868,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Financial Loss" } ] }, { - "@id": "_:Nedb073eb260845019e04df25c90d654e", + "@id": "_:N877aeaa00e28404d96212fa2798843da", "@type": [ "https://schema.org/WebPage" ], @@ -10041,13 +11895,42 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10062,15 +11945,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10080,7 +11957,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10092,41 +11969,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10137,18 +11994,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N636eafbaa808469aa226aaa74ca74855" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10158,81 +12009,49 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" + "@value": "Extremely Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N636eafbaa808469aa226aaa74ca74855", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10242,7 +12061,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10254,43 +12073,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" - } - ] - }, - { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Legal Risk Concept" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10300,7 +12119,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10312,26 +12131,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk/owl#PublicServicesExclusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10341,7 +12164,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10353,18 +12176,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Public Services Exclusion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -10383,7 +12206,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10393,7 +12216,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10405,56 +12228,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10476,7 +12268,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10486,7 +12278,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10498,59 +12290,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Concept representing Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#DisproportionateEnergyConsumption", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10560,7 +12339,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10572,24 +12351,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Disproportionate Energy Consumption" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10603,15 +12379,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N60882207c25442eab9509dc96896d91a" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10621,7 +12391,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10633,37 +12403,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:N60882207c25442eab9509dc96896d91a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10674,7 +12428,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10684,7 +12443,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10696,31 +12455,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", + "@id": "https://w3id.org/dpv/risk/owl#ServiceQualityReduced", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10730,7 +12488,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10742,26 +12500,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Service Quality Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10771,7 +12540,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10783,35 +12552,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -10820,11 +12589,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N58c7a823728a4bbc929c09b50030b836" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10832,7 +12596,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10844,44 +12608,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" - } - ] - }, - { - "@id": "_:N58c7a823728a4bbc929c09b50030b836", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -10889,7 +12635,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#GroupRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10898,50 +12644,27 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#Transphobia", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N45e627abb33f484ea319253eb043bcd9" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10951,7 +12674,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10963,53 +12686,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" - } - ] - }, - { - "@id": "_:N45e627abb33f484ea319253eb043bcd9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk/owl#SexDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.60,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11019,7 +12719,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11031,47 +12731,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Sex Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#DisabilityDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11081,55 +12764,33 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Disability Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11140,12 +12801,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.02,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11155,7 +12811,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11167,36 +12823,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#RightsLimited", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -11205,11 +12860,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N70af67194f054cbcbe4d1d616683423b" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11217,7 +12867,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11229,34 +12879,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" - } - ] - }, - { - "@id": "_:N70af67194f054cbcbe4d1d616683423b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Rights Limited" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -11274,7 +12914,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11286,21 +12926,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11316,7 +12956,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.31,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11326,7 +12966,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11338,21 +12978,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11363,7 +13003,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11373,7 +13018,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11385,77 +13030,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PotentialRisk", + "@id": "https://w3id.org/dpv/risk/owl#DelayedApplicationProcessing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" + "@value": "2024-10-21" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Potential Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11463,7 +13063,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11475,25 +13075,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Concept representing delayed processing of applications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Delayed Application Processing" } ] }, - { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + { + "@id": "https://w3id.org/dpv/risk/owl#PotentialRisk", + "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11504,18 +13099,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11525,7 +13109,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11537,43 +13121,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Potential Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11589,7 +13157,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11599,7 +13167,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11611,37 +13179,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk/owl#AgeDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.22,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11651,7 +13212,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11663,37 +13224,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Age Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.24,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11703,7 +13268,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11715,35 +13280,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -11752,11 +13317,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11764,7 +13324,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Compensation" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11776,39 +13336,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Concept representing benefits - both material and immaterial" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Benefit" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11822,15 +13370,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11840,60 +13382,53 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11903,7 +13438,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11915,48 +13450,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Concept representing Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11964,11 +13493,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -11978,62 +13502,35 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" - } - ] - }, - { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "has control" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#ReligiousDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12043,7 +13540,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12055,48 +13552,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Discrimination based on a person's religious beliefs or practices" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Religious Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12106,7 +13581,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12118,31 +13593,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12152,7 +13637,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12164,27 +13649,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Concept" + "@value": "Requirements Bias" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12200,7 +13685,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12210,7 +13695,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12222,28 +13707,22 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -12257,7 +13736,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12269,37 +13748,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12309,13 +13777,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12327,26 +13789,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -12358,12 +13814,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12373,7 +13829,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12385,22 +13844,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#Harassment", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12410,7 +13877,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12419,24 +13886,23 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12450,9 +13916,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.11,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12462,7 +13934,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12474,18 +13946,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Concept representing Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -12503,7 +13991,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12515,21 +14003,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12540,7 +14031,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na6fecbc205414992aba88eb2c49114fb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12550,7 +14052,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12559,21 +14061,37 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Sexual Violence" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sexual Violence" + } + ] + }, + { + "@id": "_:Na6fecbc205414992aba88eb2c49114fb", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ { - "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "7 Risk Levels" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -12592,7 +14110,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12614,48 +14132,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -12667,12 +14156,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12682,7 +14166,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12694,41 +14178,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Potential RiskSource" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12738,7 +14213,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Compensation" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12750,21 +14225,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12775,12 +14249,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.06,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12790,7 +14259,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12802,24 +14271,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12841,7 +14312,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" + "@id": "_:N985d9d3940a5494c898615fbbabe81ef" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12851,7 +14322,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12863,18 +14334,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Concept representing Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Unauthorised System Access" } ] }, { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", + "@id": "_:N985d9d3940a5494c898615fbbabe81ef", "@type": [ "https://schema.org/WebPage" ], @@ -12890,30 +14361,36 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12923,7 +14400,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12935,65 +14412,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + "@value": "Concept representing Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Bias" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GeographicDiscrimination", + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Discrimination based on a person's geographical origin or residence" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Geographic Discrimination" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13004,12 +14453,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13019,7 +14468,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13031,41 +14480,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13075,7 +14513,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13087,42 +14525,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Group Attribution Bias" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13131,7 +14551,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13143,26 +14563,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" + "@value": "Risks and consequences regarding policy and its associated processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Policy Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13174,12 +14588,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13189,7 +14603,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13201,25 +14615,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Extremely High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13241,7 +14661,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13251,7 +14671,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13263,43 +14683,58 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Concept representing System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13309,7 +14744,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/owl#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13321,41 +14756,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13365,7 +14796,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13377,25 +14811,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Out-Group Homogeneity Bias" + "@value": "Very High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13403,7 +14852,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13415,26 +14864,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#Homophobia", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13444,7 +14897,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13456,41 +14909,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Homophobia" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13500,7 +14949,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13512,23 +14961,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Processing Bias" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13542,15 +14989,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13560,71 +15001,38 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13634,10 +15042,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13649,43 +15054,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13697,30 +15100,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13730,7 +15159,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13742,26 +15171,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + "@value": "Concept representing Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "SexualOrientation Discrimination" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13771,7 +15227,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13783,41 +15239,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13827,7 +15283,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13839,47 +15295,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N76a6ce1a060d4760be82a172d993465b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13889,7 +15347,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13901,30 +15359,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs in or during requirements creation" + "@value": "Concept representing a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Requirements Bias" + "@value": "Compromise Account" } + ] + }, + { + "@id": "_:N76a6ce1a060d4760be82a172d993465b", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity", + "@id": "https://w3id.org/dpv/risk/owl#LegallyRelevantConsequence", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13934,7 +15402,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13946,39 +15414,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" + "@value": "A consequence that is legally relevant i.e. actionable under law" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Activity" + "@value": "Legally Relevant Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13986,7 +15442,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13998,21 +15454,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Concept representing Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14023,12 +15485,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14038,10 +15500,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14053,37 +15512,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14091,6 +15560,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14100,26 +15574,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Concept representing Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" + "@value": "Unauthorised Data Access" } + ] + }, + { + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14133,9 +15621,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.43,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14145,7 +15639,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14157,32 +15651,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Concept representing Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14192,7 +15713,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14204,18 +15728,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Very Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -14234,7 +15764,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14256,41 +15786,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14300,7 +15836,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14312,56 +15848,57 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + "@value": "Concept representing Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "In-Group Bias" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack" + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14373,41 +15910,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "has threat source" } - ] - }, - { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14418,18 +15945,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14439,7 +15960,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14451,42 +15978,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" - } - ] - }, - { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "High Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightObstructed", + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14494,7 +16019,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14506,47 +16031,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interference with or blocking of the exercise of rights" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Obstruction of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToEnterIntoContract", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14556,7 +16064,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14568,31 +16076,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Inability to Enter Into Contract" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", + "@id": "https://w3id.org/dpv/risk/owl#LanguageDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14602,7 +16109,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14614,21 +16121,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Language Discrimination" } ] }, { "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14677,45 +16184,27 @@ ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/guides" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "0.9,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", - "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -14724,7 +16213,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14733,33 +16225,44 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Very High" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/modified": [ @@ -14768,9 +16271,12 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14780,7 +16286,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + }, + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14792,37 +16301,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Incident" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14833,7 +16335,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14843,7 +16351,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14855,20 +16363,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Concept representing Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14880,12 +16394,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.37,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14895,7 +16404,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14907,26 +16416,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk/owl#ServiceLimited", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14934,7 +16455,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14946,20 +16467,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Service Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PotentialImpact", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14970,7 +16492,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14980,7 +16507,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14992,38 +16519,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential Impact" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15031,11 +16551,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Likelihood" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15045,25 +16560,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -15072,14 +16593,14 @@ "@value": "2024-02-14" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15091,42 +16612,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15136,7 +16642,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15148,26 +16654,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15175,7 +16698,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Misuse" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15187,37 +16710,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.24,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15227,7 +16754,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15239,21 +16766,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15264,12 +16791,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.64,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15279,7 +16801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15291,27 +16813,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15319,7 +16843,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15327,16 +16851,28 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to identify characteristics of event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Identification Control" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15358,7 +16894,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15368,7 +16904,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15380,18 +16916,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Concept representing Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f", "@type": [ "https://schema.org/WebPage" ], @@ -15407,25 +16943,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#ServiceCostIncreased", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15435,7 +16965,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15447,57 +16977,100 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Service Cost Increased" } ] }, { - "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "IEC 31010:2019" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N98503b14c8cf4817af92c366e96c81e7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15507,7 +17080,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15519,51 +17092,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" + "@value": "Concept representing Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sampling Bias" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualHarassment", + "@id": "_:N98503b14c8cf4817af92c366e96c81e7", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Harm" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "accepted" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Sexual Harassment" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15582,7 +17138,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15592,13 +17148,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15610,47 +17166,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "Moderate Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15660,7 +17212,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15672,36 +17224,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Implicit Bias" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevented", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15709,6 +17266,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15718,52 +17280,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Rights Exercise Prevented" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15773,7 +17320,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15785,30 +17332,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Confidentiality Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Transphobia", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15818,37 +17386,55 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#PolicyRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" + "@value": "Concept representing Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Transphobia" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ - "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15862,15 +17448,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15880,7 +17460,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15892,39 +17472,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15946,7 +17512,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66" + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15956,52 +17522,46 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Concept representing Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66", + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -16020,7 +17580,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.18,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16030,7 +17590,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16042,24 +17602,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harassment", + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16069,7 +17628,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#LegalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16078,23 +17637,33 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and consequences regarding legal compliance and its violation" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harassment" + "@value": "Legal Compliance Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@id": "https://w3id.org/dpv/risk/owl#Earthquake", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16104,7 +17673,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16116,21 +17685,66 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "The occurence or potential occurence of earthquakes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Earthquake" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@id": "https://w3id.org/dpv/risk/owl#RightsUnfulfilled", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Failure to meet or complete the fulfilment of rights" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rights Unfulfilled" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16141,7 +17755,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16151,7 +17770,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16163,30 +17782,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16196,7 +17822,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Sexism" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16208,21 +17834,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's biological sex" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sex Discrimination" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16233,7 +17864,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16243,7 +17885,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16255,21 +17897,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Concept representing Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Malicious Code Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16280,7 +17938,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16290,7 +17948,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16302,32 +17960,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16337,7 +18004,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#Renumeration" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16349,21 +18016,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16374,12 +18041,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16389,10 +18056,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16404,24 +18068,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -16438,6 +18096,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16445,7 +18108,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16457,26 +18120,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-06-12" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16484,7 +18155,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16496,27 +18167,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16526,7 +18207,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16538,25 +18219,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16571,15 +18247,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16589,7 +18259,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16601,53 +18271,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" - } - ] - }, - { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#Floods", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16657,13 +18304,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16675,43 +18316,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "The occurence or potential occurence of floods" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Floods" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.40,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16721,7 +18360,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16733,32 +18372,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16768,7 +18416,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16780,26 +18428,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16821,7 +18467,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16831,7 +18477,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16843,35 +18489,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Concept representing Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Lose of Trust" } ] }, { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -16883,7 +18530,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16893,7 +18540,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16905,47 +18552,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential RiskSource" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:Ndede7eca20f8479483447fce78fdad36" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16955,7 +18602,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16967,38 +18614,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + "@value": "Concept representing Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Response Bias" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "_:Ndede7eca20f8479483447fce78fdad36", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.80,xsd:decimal" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17007,7 +18658,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17019,30 +18670,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Concept representing Component Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DirectDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17052,7 +18716,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17064,43 +18728,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Direct Discrimination" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17108,7 +18755,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17117,24 +18764,18 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Damage" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17150,7 +18791,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17160,7 +18801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17172,21 +18813,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17219,21 +18860,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17249,7 +18890,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17271,30 +18912,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReligiousDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Neca6b5963bf24a948454cd84f743913d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17304,7 +18962,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17316,21 +18974,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's religious beliefs or practices" + "@value": "Concept representing Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Religious Discrimination" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "_:Neca6b5963bf24a948454cd84f743913d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17341,7 +19019,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Naca18964036346eea3a9e385d3a0bc12" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17351,7 +19040,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17363,22 +19052,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Concept representing System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsUnfulfilled", + "@id": "_:Naca18964036346eea3a9e385d3a0bc12", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" @@ -17390,7 +19101,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17402,29 +19113,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Failure to meet or complete the fulfilment of rights" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unfulfilment of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17435,18 +19138,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8626c0b412094a41834e4fa199b449f9" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17456,7 +19148,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17468,46 +19160,66 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "_:N8626c0b412094a41834e4fa199b449f9", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to detect event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17529,7 +19241,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b" + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17539,7 +19251,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17551,18 +19263,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Concept representing Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Rights Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b", + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8", "@type": [ "https://schema.org/WebPage" ], @@ -17578,30 +19296,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Bias", + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17611,7 +19320,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17623,25 +19332,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Bias" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17655,15 +19360,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17673,7 +19372,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17685,40 +19384,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17732,15 +19412,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17750,7 +19424,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17762,53 +19436,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" - } - ] - }, - { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#LoyaltyProgramExclusion", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.49,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17818,7 +19469,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17830,23 +19481,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Loyalty Program Exclusion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], @@ -17869,7 +19520,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" + "@id": "_:N0673a500160d458fb2189ffe9f6498fa" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17879,7 +19530,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17891,24 +19542,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Concept representing Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Psychological Harm" } ] }, { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", + "@id": "_:N0673a500160d458fb2189ffe9f6498fa", "@type": [ "https://schema.org/WebPage" ], @@ -17924,66 +19569,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Racism", + "@id": "https://w3id.org/dpv/risk/owl#ServicePartiallyProvided", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/owl#RiskConcept", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Prejudice or discrimination against people based on their race" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Racism" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", - "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17993,7 +19591,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18005,26 +19603,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Service Partially Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk/owl#Racism", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18034,7 +19636,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18046,35 +19648,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Prejudice or discrimination against people based on their race" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Racism" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -18083,6 +19684,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18090,7 +19696,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18102,44 +19708,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." + "@value": "Concept representing Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.43,xsd:decimal" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18148,7 +19751,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18160,37 +19763,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.9,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18200,10 +19792,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18215,47 +19804,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18265,7 +19848,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18277,26 +19860,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18304,7 +19895,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Harm" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18313,21 +19904,27 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that halts the risk source or prevents it from materialising" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CasteDiscrimination", + "@id": "https://w3id.org/dpv/risk/owl#IndirectDiscrimination", "@type": [ "https://w3id.org/dpv/risk/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -18355,23 +19952,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Caste Discrimination" + "@value": "Indirect Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18385,15 +19980,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18403,7 +19992,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18415,42 +20004,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "https://w3id.org/dpv/risk/owl#IncidentStatus", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18460,7 +20039,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18472,37 +20051,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.08,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18512,7 +20095,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18524,37 +20107,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToProtectVitalInterests", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18564,13 +20140,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18582,45 +20152,71 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Inability to Protect Vital Interests" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#SexualOrientationDiscrimination", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "0.04,xsd:decimal" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "SexualOrientation Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsEroded", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18628,7 +20224,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18640,39 +20236,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Rights Eroded" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -18680,7 +20268,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#TechnicalRiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18692,25 +20280,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", - "https://w3id.org/dpv/risk/owl#IntegrityConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -18725,15 +20308,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18743,7 +20320,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18755,39 +20332,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -18799,13 +20357,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18815,7 +20372,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18827,72 +20390,89 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "Moderate Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Control to detect event" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Detection Control" + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18906,15 +20486,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18924,7 +20498,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18936,37 +20510,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" - } - ] - }, - { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -18982,7 +20540,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18992,7 +20550,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19004,25 +20562,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19033,7 +20590,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -19042,6 +20599,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N597e8421bc334907aef6fa116a95a520" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -19049,7 +20611,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19061,27 +20623,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Concept representing Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" + "@value": "Lose of Negotiating Capacity" + } + ] + }, + { + "@id": "_:N597e8421bc334907aef6fa116a95a520", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19092,7 +20669,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19102,7 +20690,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19114,37 +20702,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Concept representing Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Sabotage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.51,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19154,7 +20753,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19166,37 +20765,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk/owl#EthnicDiscrimination", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19206,7 +20798,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Racism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19218,27 +20810,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Ethnic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne104ff760db74660882033533a21b5f9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19248,7 +20849,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19260,49 +20861,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:Ne104ff760db74660882033533a21b5f9", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/primer" + "@value": "IEC 31010:2019" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -19321,7 +20907,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19331,7 +20917,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19343,46 +20929,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#InabilityToProcessPayments", "@type": [ "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndd18bed776ec45498b139828923f57f1" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19392,7 +20962,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19404,37 +20974,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:Ndd18bed776ec45498b139828923f57f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Inability to Process Payments" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19445,7 +20999,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19455,7 +21009,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19467,21 +21021,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -19505,7 +21059,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19516,6 +21070,9 @@ "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19527,24 +21084,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Concept representing Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Violating Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98", "@type": [ "https://schema.org/WebPage" ], @@ -19560,9 +21117,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19573,7 +21131,69 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#NationalityDiscrimination", + "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialImpact", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19583,7 +21203,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Discrimination" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19595,27 +21215,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" + "@value": "Discrimination based on a person's nationality or citizenship" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential Consequence" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@value": "Nationality Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19629,9 +21246,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.61,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19641,7 +21264,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19653,52 +21276,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Concept representing Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAssessment", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialRisk", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#AvailabilityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19709,12 +21321,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3a914addd1624a6ab69826c81a0b0778" + "@id": "_:N61b2a56f52954abdab1d5175aec3c012" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19724,7 +21342,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19736,37 +21354,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Concept representing Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N3a914addd1624a6ab69826c81a0b0778", + "@id": "_:N61b2a56f52954abdab1d5175aec3c012", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "IEC 31010:2019" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19777,7 +21401,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19787,7 +21416,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19799,20 +21428,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19823,7 +21453,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19833,7 +21468,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19845,21 +21480,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19873,9 +21512,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19885,7 +21530,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19897,21 +21542,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Concept representing Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Confidentiality Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -19925,9 +21589,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.73,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19937,7 +21607,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#Harm" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19949,37 +21619,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Concept representing Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Injury" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19989,7 +21664,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20001,26 +21676,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0bcefedd768f46769c68ec31fad757da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20030,7 +21726,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20042,18 +21738,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Concept representing Coercion" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Coercion" + } + ] + }, + { + "@id": "_:N0bcefedd768f46769c68ec31fad757da", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Incident Assessment Report" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -20072,7 +21784,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20094,21 +21806,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20122,6 +21838,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -20129,7 +21856,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#MaliciousActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20141,66 +21868,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Concept representing Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExcellenceDiscrimination", + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#PotentialImpact", - "https://w3id.org/dpv/risk/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" + "@value": "ENISA Threat Taxonomy 2016" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Excellence Discrimination" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20214,9 +21914,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N37a077a62e9c415d99face23df8fac51" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20226,32 +21932,57 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ViolatingObligation" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LegalComplianceRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Concept representing Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Violating Legal Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "_:N37a077a62e9c415d99face23df8fac51", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -20263,12 +21994,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20278,7 +22004,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20290,27 +22016,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", - "https://w3id.org/dpv/risk/owl#PotentialRisk", - "https://w3id.org/dpv/risk/owl#PotentialRiskSource", "https://w3id.org/dpv/owl#RiskConcept", - "https://w3id.org/dpv/risk/owl#ConfidentialityConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#IntegrityConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#AvailabilityConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -20332,7 +22056,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N01f7495831e241abad48b454e2462d19" + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20342,7 +22066,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20354,53 +22078,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Concept representing Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "_:N01f7495831e241abad48b454e2462d19", + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk/owl#Misandry", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", + "https://w3id.org/dpv/risk/owl#PotentialImpact", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20410,7 +22127,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#Sexism" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20422,65 +22139,30 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Dislike, contempt, or prejudice against men" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Misandry" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#IdentityVerificationFailure", "@type": [ - "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialRisk", - "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "https://w3id.org/dpv/risk/owl#PotentialImpact", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Individual Risk" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", - "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20490,7 +22172,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ServiceRelatedConsequence" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20502,32 +22184,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Concept representing failure to verify identity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Identity Verification Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#PotentialRiskSource", + "https://w3id.org/dpv/risk/owl#PotentialRisk", + "https://w3id.org/dpv/risk/owl#PotentialConsequence", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Delaram Golpayegani" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-06-11" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20537,7 +22228,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20549,13 +22240,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Concept representing a misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Misuse" } ] } diff --git a/2.1-dev/risk/risk-owl.n3 b/2.1-dev/risk/risk-owl.n3 index 877d90a81..3b0d491e3 100644 --- a/2.1-dev/risk/risk-owl.n3 +++ b/2.1-dev/risk/risk-owl.n3 @@ -133,7 +133,7 @@ risk-owl:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:prefLabel "Accidental Misuse"@en . risk-owl:AgeDiscrimination a rdfs:Class, @@ -165,7 +165,7 @@ risk-owl:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, @@ -222,8 +222,9 @@ risk-owl:Benefit a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes benefits"@en ; - skos:prefLabel "Benefit"@en . + skos:definition "Concept representing benefits - both material and immaterial"@en ; + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk-owl:Bias a rdfs:Class, owl:Class, @@ -235,7 +236,7 @@ risk-owl:Bias a rdfs:Class, dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:prefLabel "Bias"@en . @@ -256,7 +257,7 @@ risk-owl:Blackmail a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, @@ -275,7 +276,7 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . risk-owl:CasteDiscrimination a rdfs:Class, @@ -329,7 +330,7 @@ risk-owl:Coercion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:CognitiveBias a rdfs:Class, @@ -372,7 +373,7 @@ risk-owl:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -386,7 +387,7 @@ risk-owl:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -408,7 +409,7 @@ risk-owl:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, @@ -427,7 +428,7 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, @@ -446,7 +447,7 @@ risk-owl:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . risk-owl:ConfidentialityConcept a rdfs:Class, @@ -532,9 +533,10 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:definition "Concept representing Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . risk-owl:CoverageBias a rdfs:Class, @@ -576,9 +578,22 @@ risk-owl:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . +risk-owl:CustomerSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:prefLabel "Customer Support Limited"@en . + risk-owl:Damage a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -589,9 +604,9 @@ risk-owl:Damage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:definition "Concept representing Damage"@en ; skos:prefLabel "Damage"@en . risk-owl:DataAggregationBias a rdfs:Class, @@ -644,7 +659,7 @@ risk-owl:DataBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, @@ -663,7 +678,7 @@ risk-owl:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -682,6 +697,19 @@ risk-owl:DataProcessingBias a rdfs:Class, skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; skos:prefLabel "Data Processing Bias"@en . +risk-owl:DelayedApplicationProcessing a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:prefLabel "Delayed Application Processing"@en . + risk-owl:DeliberateIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -706,7 +734,7 @@ risk-owl:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:DetectionControl a rdfs:Class, @@ -723,14 +751,15 @@ risk-owl:Detriment a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:definition "Concept representing Detriment"@en ; skos:prefLabel "Detriment"@en . risk-owl:DirectDiscrimination a rdfs:Class, @@ -761,23 +790,31 @@ risk-owl:DisabilityDiscrimination a rdfs:Class, risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk, risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:prefLabel "Discrimination"@en . +risk-owl:DisproportionateEnergyConsumption a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -793,9 +830,22 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . +risk-owl:Earthquake a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:prefLabel "Earthquake"@en . + risk-owl:EnvironmentalIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -811,8 +861,9 @@ risk-owl:EnvironmentalRisk a rdfs:Class, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:prefLabel "Environmental Risk"@en . @@ -833,7 +884,7 @@ risk-owl:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -853,11 +904,11 @@ risk-owl:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:ErroneousSystemUse a rdfs:Class, +risk-owl:ErroneousUse a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -872,8 +923,8 @@ risk-owl:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:prefLabel "Erroneous System Use"@en . + skos:definition "Concept representing erroneous use (of something)"@en ; + skos:prefLabel "Erroneous Use"@en . risk-owl:EthnicDiscrimination a rdfs:Class, owl:Class, @@ -914,9 +965,9 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:definition "Concept representing Harmful Speech"@en ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -925,7 +976,7 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, dpv-owl:RiskConcept, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:prefLabel "External Security Threat"@en . @@ -946,7 +997,7 @@ risk-owl:Extorsion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:ExtremelyHighLikelihood a rdfs:Class, @@ -1033,8 +1084,9 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:prefLabel "Financial Impact"@en . @@ -1054,9 +1106,22 @@ risk-owl:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . +risk-owl:Floods a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:prefLabel "Floods"@en . + risk-owl:Fraud a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1073,7 +1138,7 @@ risk-owl:Fraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:prefLabel "Fraud"@en . risk-owl:GenderDiscrimination a rdfs:Class, @@ -1117,6 +1182,18 @@ risk-owl:GroupAttributionBias a rdfs:Class, skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; skos:prefLabel "Group Attribution Bias"@en . +risk-owl:GroupRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:prefLabel "Societal Risk"@en . + risk-owl:HaltSource a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -1151,7 +1228,7 @@ risk-owl:Harm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -1228,7 +1305,7 @@ risk-owl:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:prefLabel "Human Errors"@en . risk-owl:IdentificationControl a rdfs:Class, @@ -1257,7 +1334,7 @@ risk-owl:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, @@ -1276,9 +1353,22 @@ risk-owl:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . +risk-owl:IdentityVerificationFailure a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:prefLabel "Identity Verification Failure"@en . + risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1291,9 +1381,9 @@ risk-owl:IllegalDataProcessing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1338,6 +1428,84 @@ risk-owl:InGroupBias a rdfs:Class, skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; skos:prefLabel "In-Group Bias"@en . +risk-owl:InabilityToEnterIntoContract a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk-owl:InabilityToEstablishLegalClaims a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk-owl:InabilityToFulfillLegalObligations a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk-owl:InabilityToProcessPayments a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Process Payments"@en . + +risk-owl:InabilityToProtectVitalInterests a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk-owl:InabilityToProvideHealthCare a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1598,10 +1766,12 @@ risk-owl:IndividualHealthSafety a rdfs:Class, risk-owl:IndividualRisk a rdfs:Class, owl:Class, + dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . @@ -1636,7 +1806,7 @@ risk-owl:Injury a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, @@ -1679,7 +1849,7 @@ risk-owl:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, @@ -1698,7 +1868,7 @@ risk-owl:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1739,16 +1909,56 @@ risk-owl:LanguageDiscrimination a rdfs:Class, skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; skos:prefLabel "Language Discrimination"@en . -risk-owl:LegalRisk a rdfs:Class, +risk-owl:LegalComplianceRisk a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk-owl:LegalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:prefLabel "Legal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk-owl:LegalSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Legal Support Limited"@en . + +risk-owl:LegallyRelevantConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:prefLabel "Legally Relevant Consequence"@en . risk-owl:LoseCredibility a rdfs:Class, owl:Class, @@ -1765,7 +1975,7 @@ risk-owl:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:prefLabel "Lose of Credibility"@en . risk-owl:LoseCustomerConfidence a rdfs:Class, @@ -1783,7 +1993,7 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:prefLabel "Lose of Customer Confidence"@en . risk-owl:LoseGoodwill a rdfs:Class, @@ -1801,7 +2011,7 @@ risk-owl:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:prefLabel "Lose of Goodwill"@en . risk-owl:LoseNegotiatingCapacity a rdfs:Class, @@ -1819,7 +2029,7 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk-owl:LoseOpportunity a rdfs:Class, @@ -1837,7 +2047,7 @@ risk-owl:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:prefLabel "Lose of Opportunity"@en . risk-owl:LoseReputation a rdfs:Class, @@ -1855,7 +2065,7 @@ risk-owl:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:prefLabel "Lose of Reputation"@en . risk-owl:LoseTrust a rdfs:Class, @@ -1873,7 +2083,7 @@ risk-owl:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:prefLabel "Lose of Trust"@en . risk-owl:LowLikelihood a rdfs:Class, @@ -1921,6 +2131,19 @@ risk-owl:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk-owl:LoyaltyProgramExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk-owl:MaliciousActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1950,7 +2173,7 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, @@ -1970,7 +2193,7 @@ risk-owl:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, @@ -1983,9 +2206,9 @@ risk-owl:MaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:definition "Concept representing Material Damage"@en ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2027,7 +2250,7 @@ risk-owl:Misuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:prefLabel "Misuse"@en . risk-owl:ModerateLikelihood a rdfs:Class, @@ -2176,9 +2399,9 @@ risk-owl:NonMaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2218,11 +2441,26 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OrganisationalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk-owl:OutGroupHomogeneityBias a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -2266,11 +2504,37 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . +risk-owl:PersonalisationDisabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Disabled"@en . + +risk-owl:PersonalisationEnabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Enabled"@en . + risk-owl:PhishingScam a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -2287,7 +2551,7 @@ risk-owl:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, @@ -2305,7 +2569,7 @@ risk-owl:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, @@ -2319,6 +2583,17 @@ risk-owl:PhysicalHarm a rdfs:Class, sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . +risk-owl:PolicyRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:prefLabel "Policy Risk"@en . + risk-owl:PotentialConsequence a rdfs:Class, owl:Class ; dct:contributor "Harshvardhan J. Pandit" ; @@ -2389,7 +2664,7 @@ risk-owl:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, @@ -2404,11 +2679,24 @@ risk-owl:PublicOrderBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:definition "Concept representing Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . +risk-owl:PublicServicesExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Public Services Exclusion"@en . + risk-owl:RM3x3S1L1 a rdfs:Class, owl:Class, risk-owl:RiskAnalysis ; @@ -3486,7 +3774,7 @@ risk-owl:Reidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -3568,7 +3856,7 @@ risk-owl:ReputationalRisk a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . @@ -3617,20 +3905,7 @@ risk-owl:Reward a rdfs:Class, skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . -risk-owl:RightEroded a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept, - risk-owl:PotentialConsequence, - risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RightsImpact ; - sw:term_status "accepted"@en ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk-owl:RightObstructed a rdfs:Class, +risk-owl:RightsDenied a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3639,11 +3914,11 @@ risk-owl:RightObstructed a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsDenial a rdfs:Class, +risk-owl:RightsEroded a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3652,11 +3927,11 @@ risk-owl:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsExercisePrevention a rdfs:Class, +risk-owl:RightsExercisePrevented a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3669,7 +3944,7 @@ risk-owl:RightsExercisePrevention a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, @@ -3685,13 +3960,13 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en ; + skos:definition "Concept representing Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsLimitation a rdfs:Class, +risk-owl:RightsLimited a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3704,9 +3979,22 @@ risk-owl:RightsLimitation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk-owl:RightsObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsUnfulfilled a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -3717,10 +4005,10 @@ risk-owl:RightsUnfulfilled a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsViolation a rdfs:Class, +risk-owl:RightsViolated a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3733,7 +4021,7 @@ risk-owl:RightsViolation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RiskAnalysis a rdfs:Class, @@ -3869,7 +4157,7 @@ risk-owl:Sabotage a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:SamplingBias a rdfs:Class, @@ -3903,7 +4191,7 @@ risk-owl:Scam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, @@ -3917,7 +4205,7 @@ risk-owl:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, @@ -3938,7 +4226,7 @@ risk-owl:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:prefLabel "Security Breach"@en . risk-owl:SelectionBias a rdfs:Class, @@ -3956,6 +4244,161 @@ risk-owl:SelectionBias a rdfs:Class, skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; skos:prefLabel "Selection Bias"@en . +risk-owl:ServiceAlternativeOffered a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Alternative Offered"@en . + +risk-owl:ServiceCostIncreased a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Cost Increased"@en . + +risk-owl:ServiceDenied a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Denied"@en . + +risk-owl:ServiceLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Limited"@en . + +risk-owl:ServiceNotProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Not Provided"@en . + +risk-owl:ServicePartiallyProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Partially Provided"@en . + +risk-owl:ServiceProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provided"@en . + +risk-owl:ServiceProvisionDelayed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provision Delayed"@en . + +risk-owl:ServiceQualityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Quality Reduced"@en . + +risk-owl:ServiceRelatedConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence related to the provision of a service"@en . + +risk-owl:ServiceSecurityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Security Reduced"@en . + +risk-owl:ServiceTermination a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Termination"@en . + risk-owl:SexDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -4021,7 +4464,7 @@ risk-owl:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:ShareRisk a rdfs:Class, @@ -4060,9 +4503,9 @@ risk-owl:SocialDisadvantage a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . risk-owl:SocietalBias a rdfs:Class, @@ -4087,21 +4530,24 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Societal Health & Safety"@en . -risk-owl:SocietalRisk a rdfs:Class, +risk-owl:SocietalRiskConcept a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:prefLabel "Societal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk-owl:SourceControl a rdfs:Class, owl:Class, @@ -4131,7 +4577,7 @@ risk-owl:Spoofing a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:prefLabel "Spoofing"@en . risk-owl:StatisticalBias a rdfs:Class, @@ -4165,7 +4611,7 @@ risk-owl:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -4186,7 +4632,7 @@ risk-owl:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, @@ -4205,10 +4651,25 @@ risk-owl:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk-owl:TechnicalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk-owl:Terrorism a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -4222,9 +4683,9 @@ risk-owl:Terrorism a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:definition "Concept representing Terrorism"@en ; skos:prefLabel "Terrorism"@en . risk-owl:Threat a rdfs:Class, @@ -4276,7 +4737,7 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, @@ -4291,7 +4752,7 @@ risk-owl:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, @@ -4311,7 +4772,7 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, @@ -4330,7 +4791,7 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, @@ -4349,7 +4810,7 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, @@ -4368,7 +4829,7 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, @@ -4387,7 +4848,7 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, @@ -4406,7 +4867,7 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, @@ -4425,7 +4886,7 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, @@ -4441,7 +4902,7 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, @@ -4460,7 +4921,7 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, @@ -4480,7 +4941,7 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, @@ -4499,7 +4960,7 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, @@ -4519,7 +4980,7 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, @@ -4539,7 +5000,7 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, @@ -4558,7 +5019,7 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, @@ -4567,7 +5028,7 @@ risk-owl:UserRisks a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:prefLabel "User Risks"@en . @@ -4668,9 +5129,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -4686,10 +5147,11 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk-owl:ViolatingEthicsCode a rdfs:Class, @@ -4704,9 +5166,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -4722,23 +5184,48 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk-owl:ViolatingObligation a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Obligation"@en . + risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . +risk-owl:ViolatingProhibition a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Prohibition"@en . + risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -4751,10 +5238,11 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk-owl:ViolenceAgainstChildren a rdfs:Class, @@ -4772,7 +5260,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/risk-owl.rdf b/2.1-dev/risk/risk-owl.rdf index 5827b7801..2345d563b 100644 --- a/2.1-dev/risk/risk-owl.rdf +++ b/2.1-dev/risk/risk-owl.rdf @@ -13,5592 +13,6117 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Harshvardhan J. Pandit - Level where Risk is Extremely Low - - 0.01,xsd:decimal accepted - Extremely Low Risk - 2022-08-18 - - - - Re-identification - 2024-08-16 - - - - - + + - Something that acts as or causes Re-identification - 2022-08-19 - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - - Harshvardhan J. Pandit - accepted - + 2022-08-18 + 0.01,xsd:decimal + Level where Likelihood is Extremely Low + Extremely Low Likelihood + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - Something that acts as or causes Violation of Statutory Obligations - + + ISO/IEC 24027:2021 + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + - + - Violation of Statutory Obligations - - 2022-08-17 - modified - 2024-08-16 - Harshvardhan J. Pandit + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + Societal Bias + 2024-09-13 + - - 2024-05-19 + + accepted - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - + Policy Risk + + + - accepted - Incident Preliminary Report + Risks and consequences regarding policy and its associated processes + - + + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 0.31,xsd:decimal - - - - + + 2022-08-17 + Harshvardhan J. Pandit accepted - 2024-09-13 - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - + - - - - - Level where Severity is Low - + + Level where Severity is Very High Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 accepted 2022-08-18 - Low Severity - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - - - - - Scale with 3 Risk Levels from High to Low + 0.9,xsd:decimal + - - Harshvardhan J. Pandit - accepted - 2022-08-18 - 3 Risk Levels - + Very High Severity + + - - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - 2024-08-16 - - - - + + + + - Harshvardhan J. Pandit accepted - This concept was called "IllegalProcessingData" in DPV 2.0 + 2024-08-16 + Concept representing Loss of Opportunity + + Lose of Opportunity 2022-08-17 - - - - accepted - - - - 2022-08-18 - Very Low Likelihood - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - Harshvardhan J. Pandit - Level where Likelihood is Very Low - - + Harshvardhan J. Pandit + - + - - - - + + + - 2024-08-16 - - Harshvardhan J. Pandit + Service Provision Delayed + Stub - Fraud accepted - Something that acts as or causes Fraud - 2022-08-17 - + 2024-10-21 + - - + + - + - + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + Discrimination + Georg P. Krog accepted - Language Discrimination - Discrimination based on a person's language, often linked to national origin or ethnicity + 2024-09-30 - + - - 2022-08-17 - - - - + + 2024-08-16 + Concept representing Illegal Processing of Data - + + + - 2024-08-16 - - + 2022-08-17 + + This concept was called "IllegalProcessingData" in DPV 2.0 Harshvardhan J. Pandit - Here equipment refers to physical equipment - Equipment Malfunction accepted - Something that acts as or causes Equipment Malfunction - + Illegal Data Processing + + - - - + + ISO/IEC 24027:2021 + 2024-09-13 + Confounding Variables Bias + + - + - - Interference with or blocking of the exercise of rights + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association accepted - Obstruction of Rights - In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - - - - Risk Matrix 7x7 - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types Harshvardhan J. Pandit accepted + + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + 0.40,xsd:decimal + High Risk (RM5x5 S:2 L:5) 2022-08-17 - + - - + + Source Control + - 2022-08-17 - Low Risk (RM7x7 S:2 L:5) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Risk Mitigation Measure that controls the Source - 0.20,xsd:decimal + Harshvardhan J. Pandit accepted - + 2024-05-19 + - - modified - + + accepted + + Low Risk (RM5x5 S:1 L:4) - - - - + - Something that acts as or causes Interception of Communications + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + 2022-08-17 Harshvardhan J. Pandit + 0.16,xsd:decimal + + + + 2024-05-19 - - Intercept Communications - This concept was called "InterceptionCommunications" in DPV 2.0 - 2022-08-17 - 2024-08-16 - - - - - - - + accepted + - 2024-09-30 - Discrimination based on a person's biological sex - - Sex Discrimination - accepted - + Identification Control + Control to identify characteristics of event + - - Harshvardhan J. Pandit - 0.5,xsd:decimal - 2022-08-18 + + accepted + - - Moderate Likelihood - accepted - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - Level where Likelihood is Moderate - - - + Control that monitors a Risk Source + Monitor Risk Source + 2024-05-19 + Harshvardhan J. Pandit + - - Non-Response Bias - 2024-09-13 - ISO/IEC 24027:2021 - - - + + 0.80,xsd:decimal - - - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - accepted - - - - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate 2022-08-17 - Moderate Risk (RM3x3 S:2 L:2) - Harshvardhan J. Pandit - 0.44,xsd:decimal + Very High Risk (RM5x5 S:5 L:4) accepted - + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + - - This concept was called "ChildViolence" in DPV 2.0 - - - - + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + - 2024-08-16 - Something that acts as or causes Child Violence - - Harshvardhan J. Pandit - + Incident Assessment Report + + A report describing the assessment of an incident in terms of its effects or impacts accepted - Violence against children - 2022-08-17 - + 2024-05-19 + - - 2024-09-13 - Sampling Bias + + Harshvardhan J. Pandit accepted - - - - - - - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when data records are not collected randomly from the intended population - - - - - + Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + + 2024-09-29 - Concepts associated with security threats that are likely to originate externally - - accepted - External Security Threat - + This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + Confidentiality Concept - - + + Concept representing Authorisation Failure + - - + + + + Authorisation Failure + + 2022-08-17 + Harshvardhan J. Pandit accepted - 2022-03-23 - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - Something that acts as or causes Detriment - Detriment - 2024-08-16 - - - - - - - Availability Incident - 2024-05-19 - Incident where the availability of information or system has been affected - accepted - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + 2024-08-16 + - - Harshvardhan J. Pandit - accepted - - Status associated with an incident - Incident Status 2024-02-14 - - - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - - - Non-Normality Bias + Harshvardhan J. Pandit + Status associated with an incident - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + accepted - 2024-09-13 - ISO/IEC 24027:2021 - + Incident Status - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - 0.20,xsd:decimal - + + Very High Risk (RM7x7 S:4 L:7) + 0.57,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + 2022-08-17 Harshvardhan J. Pandit accepted - Low Risk (RM5x5 S:5 L:1) - 2022-08-17 - + + - - Harshvardhan J. Pandit - PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + + + + + + + + + modified + + 2022-08-17 + Intercept Communications + Harshvardhan J. Pandit + This concept was called "InterceptionCommunications" in DPV 2.0 + 2024-08-16 + Concept representing Interception of Communications + + + + + 0.24,xsd:decimal + 2022-08-17 + Moderate Risk (RM7x7 S:3 L:4) + Harshvardhan J. Pandit accepted - Potential Impact - Indicates a concept can potentially be a 'impact' concept within an use-case - - 2024-09-29 + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + - - - - + + + + - Societal Health & Safety + Stub + accepted + 2024-10-21 + Inability to Protect Vital Interests + + + + 2024-02-14 + Indicates an incident is associated with the specified context + + + + accepted - + + has incident - - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + accepted + - + - + - - 2024-09-13 - Bias that occurs when a human makes an association or assumption based on their mental models and memories - accepted - Implicit Bias - ISO/IEC 24027:2021 - - - - 2022-03-30 - - - - - - - Harshvardhan J. Pandit 2024-08-16 + Concept representing Coercion + Coercion + 2022-08-17 + - accepted - Something that acts as or causes Damage - Damage - + Harshvardhan J. Pandit + - + accepted - - - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low + 2024-05-19 Harshvardhan J. Pandit - 2022-08-18 - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - + - Very Low Risk (RM7x7 S:1 L:6) - 0.12,xsd:decimal - 2022-08-17 - - Harshvardhan J. Pandit - accepted - + Control that halts the risk source or prevents it from materialising + Halt Source + - + + + - - + + - 2024-09-30 - Direct Discrimination - accepted - Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - + Unauthorised Data Access + 2024-08-16 + Concept representing Unauthorised Data Access + 2022-08-17 + Harshvardhan J. Pandit + + - - - - + + - + + + - 2022-08-17 - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - 2024-08-16 + Discrimination based on a person's nationality or citizenship + Nationality Discrimination + accepted + 2024-09-30 + + + Harshvardhan J. Pandit - Distributed Denial of Service Attack (DDoS) accepted - - - - - Moderate Risk (RM5x5 S:3 L:2) - + 2022-08-18 + + - 0.24,xsd:decimal - 2022-08-17 + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + + + accepted + + + + + + + 2022-03-30 + Concept representing Damage + 2024-08-16 + Damage Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - accepted - + - - - + + 2022-08-17 + - + + + - 2022-08-17 - Harshvardhan J. Pandit - 2024-08-16 - - Something that acts as or causes Extorsion - Extorsion + Fraud accepted + + Concept representing Fraud + 2024-08-16 - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - + + + - Threat - accepted - - Risk source event which causes Risk + An actual or occured event + + + 2024-05-19 2024-02-14 + accepted + + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + 2024-08-16 + Incident is realised or materialised risk + Incident - - - - - + + - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - - accepted - 2024-09-13 - Confirmation Bias - ISO/IEC 24027:2021 - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - - 5 Likelihood Levels + Very High Risk Harshvardhan J. Pandit - Scale with 5 Likelihood Levels from Very High to Very Low + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + accepted 2022-08-18 + + 0.9,xsd:decimal + Level where Risk is Very High + + + + - + + + + Risks and issues that arise during operational processes + accepted - + Operational Security Risk + - - 2022-03-23 - + + 2024-09-13 + ISO/IEC 24027:2021 + + - + - - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - 2024-08-16 accepted - Benefit - Something that acts as or causes benefits - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + Simpson'S Paradox Bias + - + + accepted - Harshvardhan J. Pandit - 0.22,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - - accepted - 2022-08-17 - Low Risk (RM3x3 S:2 L:1) - + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + 2024-09-13 + ISO/IEC 24027:2021 + - - Something that acts as or causes Unauthorised Code Disclosure - accepted + + - + - - - - Unauthorised Code Disclosure + Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity 2022-08-17 + + accepted + Harshvardhan J. Pandit 2024-08-16 - - + Financial Loss + - - Moderate Risk (RM5x5 S:3 L:3) - - Harshvardhan J. Pandit - 0.36,xsd:decimal - accepted + + + - + + - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - + Gender Discrimination + Discrimination based on a person's gender identity or gender expression + 2024-09-30 + accepted + + - - 2022-08-17 + + + - - - 2024-08-16 - Injury + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Harshvardhan J. Pandit - - Something that acts as or causes Injury accepted - + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + 2024-09-13 + ISO/IEC 24027:2021 + - - - - - + + Low Risk (RM7x7 S:4 L:2) - + - Component Malfunction + 2022-08-17 - Something that acts as or causes Component Malfunction + Harshvardhan J. Pandit accepted - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + 0.16,xsd:decimal + - - - - - - - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + accepted 2024-08-16 + + Concept representing Copyright Violation + 2022-08-17 - accepted + Copyright Violation Harshvardhan J. Pandit - - Something that acts as or causes Unwanted Code Deletion - 2022-08-17 - Unwanted Code Deletion - + + - + + Concept representing Loss of Goodwill + 2022-08-17 + + + - - - - 2024-08-16 - - accepted - Georg P. Krog, Harshvardhan J. Pandit - 2024-04-14 - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - - Harshvardhan J. Pandit + accepted - - - - - - - - Scam - 2022-08-17 - Something that acts as or causes Scam 2024-08-16 - - - + + Lose of Goodwill + - - - - - - + + + + - Something that acts as or causes Phishing Scam - Phishing Scam + modified + Concept representing Violation of Code of Conduct + 2022-08-17 + This concept was called "ViolationCodeConduct" in DPV 2.0 Harshvardhan J. Pandit + Violating Code of Conduct + 2024-08-16 - accepted - - 2022-08-17 - + - - - + - + + + + 2024-10-21 + Stub + Service Provided accepted - Judicial Costs - Something that involves or causes judicial costs to be paid - + - - + + - - - - + - - - 2024-08-16 - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Code Access - accepted - - Unauthorised Code Access - 2022-08-17 - - - - - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 0.16,xsd:decimal + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 + Harshvardhan J. Pandit accepted - 2022-08-17 - Low Risk (RM5x5 S:1 L:4) + Concept representing Child Violence - + Violence against children + 2024-08-16 + - - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - + + + + + - Harshvardhan J. Pandit - Low Risk + Rights Violated + + The infringement or breach of rights in a manner that constitues a 'violation' of those rights accepted 2022-08-18 - Level where Risk is Low - 0.25,xsd:decimal - - - + Georg P. Krog, Harshvardhan J. Pandit + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2024-08-16 + - - Sexual Violence - 2022-08-17 + + + - - - - Something that acts as or causes Sexual Violence + modified + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 + + Harshvardhan J. Pandit + Violating Ethics Code 2024-08-16 - Harshvardhan J. Pandit - accepted - - + Concept representing Violation of Ethics Code + - - Denial of Rights - - + + accepted + Concept representing Detriment + + - accepted - The refusal or withholding or denial of the existence or applicability of rights - The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + 2024-08-16 + Detriment + 2022-03-23 + - - Harshvardhan J. Pandit - + - + - 0.01,xsd:decimal - accepted - 2022-08-18 - Level where Likelihood is Extremely Low - Extremely Low Likelihood - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - - - - Harshvardhan J. Pandit 2022-08-17 + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + 0.99,xsd:decimal + Harshvardhan J. Pandit accepted - 0.61,xsd:decimal - - - - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - 2022-08-17 - - + + + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + + - Public Order Breach + accepted + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit 2024-08-16 - Harshvardhan J. Pandit - + Reward + + + + + + + + + + + + + 2022-08-17 accepted - Something that acts as or causes Public Order Breach - - + + Harshvardhan J. Pandit + + 2024-08-16 + Concept representing a compromised account that is then used by the compromiser + Compromise Account + - - 2024-05-19 + + accepted + 2022-08-18 - Control that halts the risk source or prevents it from materialising + + + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low Harshvardhan J. Pandit + + + - Halt Source + Control that avoids the risk source + + 2024-05-19 + Harshvardhan J. Pandit accepted + Avoid Source - - - - + + - - Discrimination based on a person's nationality or citizenship - 2024-09-30 + Change Consequence + 2024-05-19 + Harshvardhan J. Pandit + Control that changes Consequence accepted - Nationality Discrimination - + - + + + + + - + Harshvardhan J. Pandit + Material Damage accepted - 0.80,xsd:decimal - Very High Risk (RM5x5 S:5 L:4) - 2022-08-17 - Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - + 2022-03-30 + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2024-08-16 + Concept representing Material Damage + - - Things that cause or have the potential to impact financial resources + + - - + + 2024-10-21 + Service Security Reduced + Stub accepted - Financial Impact - + - - + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + 2024-08-16 + Concept representing Corruption of Data - + + - + + - Something that acts as or causes Loss of Goodwill + + modified 2022-08-17 - Lose of Goodwill - - 2024-08-16 Harshvardhan J. Pandit - - accepted - + This concept was called "Corruption Data" in DPV 2.0 + Data Corruption + - - Harshvardhan J. Pandit - + - + + + + - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + Disproportionate Energy Consumption accepted - 0.29,xsd:decimal - Moderate Risk (RM7x7 S:7 L:2) - 2022-08-17 - + + The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + 2024-10-21 + - - + + - - - - + + + - 2024-08-16 - - Spoofing - Harshvardhan J. Pandit - - Something that acts as or causes Spoofing + Service Quality Reduced + 2024-10-21 + Stub accepted - 2022-08-17 - - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + - - 2022-08-17 - + + + - + - + - Harshvardhan J. Pandit - Erroneous System Use - 2024-08-16 - + 2024-09-30 accepted - - Something that acts as or causes Erroneous System Use - + SexualOrientation Discrimination + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + - - 2022-08-17 - - - + - + + + - modified - This concept was called "Corruption Data" in DPV 2.0 - Something that acts as or causes Corruption of Data + Financial Impact + accepted - 2024-08-16 - - Harshvardhan J. Pandit - Data Corruption - + 2024-10-21 + Things that cause or have the potential to impact financial resources + - + + + - + - - - + - 2022-08-19 - 2024-09-30 - 2024-08-16 - Georg P. Krog + Harshvardhan J. Pandit + 2022-08-17 - Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate - Something that acts as or causes Discrimination accepted - Discrimination - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + 2024-08-16 + Concept representing Unauthorised Resource Use + Unauthorised Resource Use + - - 0.57,xsd:decimal - 2022-08-17 + + 2022-08-17 Harshvardhan J. Pandit + 0.44,xsd:decimal + accepted - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + Moderate Risk (RM3x3 S:2 L:2) + + + + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + + + + Harshvardhan J. Pandit accepted - Very High Risk (RM7x7 S:4 L:7) + 0.49,xsd:decimal + 2022-08-17 - - Equipment Failure + - - - + + modified + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 + + Violating Legal Obligation Harshvardhan J. Pandit + Concept representing Violation of Legal Obligations 2024-08-16 - - Here equipment refers to physical equipment - accepted - Something that acts as or causes Equipment Failure - - 2022-08-17 - + + + - - - - - + + - + + accepted - Something that acts as or causes Unauthorised Access to Premises + + 2024-08-16 + Identity Fraud + Concept representing Identity Fraud + 2022-08-17 - Unauthorised Access to Premises Harshvardhan J. Pandit - 2024-08-16 - - - + - + + + + + Remove Source + Control that removes the risk source + 2024-05-19 + Harshvardhan J. Pandit + accepted - + + + + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Very High Likelihood + 2022-08-18 + 0.9,xsd:decimal + - 2024-02-14 + Level where Likelihood is Very High Harshvardhan J. Pandit + accepted - The status of a incident is unknown - Incident Status Unknown - + + - - - Human Errors - 2022-08-17 + + + + - - - - Something that acts as or causes Human Errors - - 2024-08-16 + 2022-08-17 + Lose of Customer Confidence Harshvardhan J. Pandit accepted - + + 2024-08-16 + Concept representing Loss of Customer Confidence + + - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + - - accepted - + + + - 2022-08-17 - High Risk (RM7x7 S:4 L:5) + accepted + Concepts associated with security threats that are likely to originate externally - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 0.41,xsd:decimal - + External Security Threat + - + + The refusal or withholding or denial of the existence or applicability of rights + + + + + + + Rights Denied + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + accepted - Extremely Low Risk (RM7x7 S:1 L:3) - Harshvardhan J. Pandit - 0.06,xsd:decimal + + + - accepted 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + Very Low Risk (RM7x7 S:2 L:3) + Harshvardhan J. Pandit + accepted + 0.12,xsd:decimal + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM5x5 S:4 L:3) - - 0.48,xsd:decimal - Harshvardhan J. Pandit + + Bias that occurs when data records are not collected randomly from the intended population + + + + - + accepted - 2022-08-17 - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Sampling Bias + 2024-09-13 + ISO/IEC 24027:2021 + - + - - + + + + + - Operational Security Risk + 2024-08-16 accepted - Risks and issues that arise during operational processes - + Concept representing Malicious Code Attack + Malicious Code Attack + 2022-08-17 + + Harshvardhan J. Pandit + - + + Loyalty Program Exclusion + Stub + + + + + + accepted + 2024-10-21 + + + - - + - 2024-08-16 - Harshvardhan J. Pandit accepted - Lose of Trust - 2022-08-17 - Something that acts as or causes Loss of Trust - + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + Incident Terminated + 2024-02-14 + - - Risks and issues that affect or have the potential to affect specific individuals - - + - + + + + - Individual Risk + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Non-Normality Bias + 2024-09-13 + ISO/IEC 24027:2021 + - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - 2022-08-17 - 0.08,xsd:decimal - + + Low Risk (RM7x7 S:2 L:4) + 2022-08-17 Harshvardhan J. Pandit - Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + + 0.16,xsd:decimal accepted - + + Concept representing Non-Material Damage + Non-Material Damage + + + + + 2024-08-16 + 2022-03-30 + The criteria for what is considered material damage is based in jurisdictional laws and norms Harshvardhan J. Pandit accepted - 2022-08-18 - - - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - Risk Analysis + - - + + Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + Violating Obligation + + - - - Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - The gradual weakening or reduction of the scope and protection of rights accepted - Erosion of Rights - + 2024-10-21 + - - 2024-08-16 - - - - - - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + ENISA Threat Taxonomy 2016 + + + 2022-08-17 + + + + + + Unauthorised Access to Premises Harshvardhan J. Pandit accepted - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - 2022-08-17 + 2024-08-16 + + Concept representing Unauthorised Access to Premises + - - 2022-08-17 - - + - + + + - Psychological Harm - 2024-08-16 - - Something that acts as or causes Psychological Harm - Harshvardhan J. Pandit + 2024-10-21 + Service Termination + Stub accepted - - + + - - - + + 2022-08-19 + - + + + - - Malicious Activity - Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + Harshvardhan J. Pandit + Re-identification accepted - - - - - - - - - has threat source - Indicates the threat (subject) has the indicated source (object) - 2024-02-14 - - accepted + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2024-08-16 + Concept representing Re-identification + - - + + Harshvardhan J. Pandit - - - + + + - - Something that acts as or causes Unwanted Disclosure of Data - 2024-08-16 - Harshvardhan J. Pandit + Exposure to Harmful Speech + accepted - Unwanted Disclosure of Data + 2024-08-16 + This concept was called "HarmfulSpeech" in DPV 2.0 2022-08-17 - + Concept representing Harmful Speech + - - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - High Risk - + + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Threat Landscape 2021 + + + + + + - Harshvardhan J. Pandit - 0.75,xsd:decimal + In-Group Bias accepted - 2022-08-18 - Level where Risk is High - - - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias that occurs when showing partiality to one's own group or own characteristics + 2024-09-13 + ISO/IEC 24027:2021 + - - - Harshvardhan J. Pandit - 0.10,xsd:decimal + + 2024-09-30 + + + - + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low accepted - Very Low Risk (RM7x7 S:5 L:1) - 2022-08-17 - + + Discrimination based on a person's geographical origin or residence + Geographic Discrimination + - - - + + + + - - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + 2024-09-13 + ISO/IEC 24027:2021 + Bias accepted - Discrimination against individuals because of their racial background or skin color - Racial Discrimination - 2024-09-30 - + + - - - - + - - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - Prevent Exercising of Rights - 2024-08-16 - + accepted - Actions or measures that prevent an individual or group from exercising their legal rights. - + + Incident caused due to environmental factors outside human controls + 2024-05-19 + Environmental Incident - + - - Harshvardhan J. Pandit - 0.75,xsd:decimal + Incident caused due to accidental actions arising from human or human-controlled situations + Accidental Incident + 2024-05-19 - High Likelihood + accepted - 2022-08-18 - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - Level where Likelihood is High - - - - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 2022-08-17 - 0.67,xsd:decimal + - - High Risk (RM3x3 S:2 L:3) + 2024-02-14 + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + - Harshvardhan J. Pandit accepted - - - accepted - + + - Very High Risk (RM5x5 S:4 L:5) - 0.80,xsd:decimal 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + Moderate Risk (RM5x5 S:2 L:4) + 0.32,xsd:decimal Harshvardhan J. Pandit + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - accepted + + 2024-08-16 - - - - - - Misandry - 2024-09-30 - - Dislike, contempt, or prejudice against men - - - - - - - - + + - Something that acts as or causes Malicious Code Attack + + 2022-08-17 + Personal Safety Endangerment Harshvardhan J. Pandit - - + Concept representing Personal Safety Endangerment accepted - 2022-08-17 - Malicious Code Attack - 2024-08-16 - + + - - + + Harshvardhan J. Pandit - Level where Severity is Extremely High accepted - 2022-08-18 - Extremely High Severity - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 0.99,xsd:decimal - - - - https://www.iso.org/standard/72140.html - IEC 31010:2019 - + Incident Status Unknown + The status of a incident is unknown + 2024-02-14 + - + + ENISA Threat Taxonomy 2016 https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 - - - - + - Very Low Risk (RM5x5 S:3 L:1) - Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + + + 2024-02-14 + + caused by threat + + Indicates the cause of associated context (subject) was the indicated threat (object) accepted - 2022-08-17 - 0.12,xsd:decimal - - - + + 0.60,xsd:decimal + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High Harshvardhan J. Pandit - High Risk (RM7x7 S:3 L:5) accepted - 0.31,xsd:decimal - + + High Risk (RM5x5 S:5 L:3) + - - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - + + + 2024-02-14 + Threat + Risk source event which causes Risk + accepted - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - Confounding Variables Bias - accepted - 2024-09-13 - - - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Bias that occurs in or during requirements creation + 2024-09-13 + ISO/IEC 24027:2021 + + - + - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Requirements Bias accepted - Privacy - + + Requirements bias also represents occasions for the human cognitive biases to manifest + - - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - Harshvardhan J. Pandit - + + - + Control that removes Consequence i.e. prevents it from materialising + Remove Consequence + 2024-05-19 + Harshvardhan J. Pandit accepted - 0.5,xsd:decimal - 2022-08-18 - Level where Severity is Moderate - Moderate Severity - - - - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - ENISA Threat Landscape for Ransomware Attacks 2022 + + - - Extremely Low Severity - + + - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Level where Severity is Extremely Low - - 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Level where Risk is Moderate + 0.5,xsd:decimal Harshvardhan J. Pandit + Moderate Risk accepted + 2022-08-18 - + + + - - + + Risk Matrix 5x5 + + Harshvardhan J. Pandit + accepted + 2022-08-17 - 0.37,xsd:decimal - Harshvardhan J. Pandit - - High Risk (RM7x7 S:3 L:6) - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + - - 2022-08-17 - Moderate Risk (RM5x5 S:2 L:3) - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate accepted - 0.24,xsd:decimal - - - - - An impact assessment associated with a incident + 0.99,xsd:decimal + 2022-08-18 + Level where Risk is Extremely High + Extremely High Risk + + + + Potential Consequence + PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + + 2024-09-29 + Indicates a concept can potentially be a 'consequence concept within an use-case Harshvardhan J. Pandit - Incident Impact Assessment - 2024-05-19 accepted + - - + + + + + - 0.12,xsd:decimal - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - Harshvardhan J. Pandit - - Very Low Risk (RM5x5 S:1 L:3) accepted - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + Cognitive Bias + 2024-09-13 + ISO/IEC 24027:2021 + Bias that occurs when humans are processing and interpreting information + - - 0.02,xsd:decimal + + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + Low Risk + - - Extremely Low Risk (RM7x7 S:1 L:1) - 2022-08-17 - + 0.25,xsd:decimal Harshvardhan J. Pandit accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - 2022-08-17 - Very High Risk (RM7x7 S:6 L:5) + 2022-08-18 + Level where Risk is Low + + + + + + 2024-10-21 + Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + Organisational in this context refers to an organisation which is not human but is managed by humans - + + + + + - Harshvardhan J. Pandit accepted - 0.61,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - - + + Organisational Risk Concept + + + Georg P. Krog + 2022-08-19 + Concept representing Unauthorised Re-Identification + + + + + - Potential RiskSource - 2024-09-29 - Harshvardhan J. Pandit + Unauthorised Re-Identification accepted - Indicates a concept can potentially be a 'risk source' concept within an use-case - PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-08-16 + - - - - - + + 0.75,xsd:decimal + - 2022-03-30 - The criteria for what is considered material damage is based in jurisdictional laws and norms - Something that acts as or causes Material Damage - - 2024-08-16 + Level where Severity is High + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 accepted - Material Damage + Harshvardhan J. Pandit - + 2022-08-18 + High Severity + + + - - Discrimination based on a person's geographical origin or residence - - + - + + + - accepted - Geographic Discrimination - 2024-09-30 + 2022-08-17 + Concept representing Loss of Credibility + Harshvardhan J. Pandit - + accepted + 2024-08-16 + Lose of Credibility + + - - Something that acts as or causes Unauthorised System Modification - - + + Concept representing Phishing Scam - + + + - Unauthorised System Modification - + accepted + Harshvardhan J. Pandit + Phishing Scam 2024-08-16 - Harshvardhan J. Pandit - accepted + 2022-08-17 - + - - + + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + + Risk Analysis Harshvardhan J. Pandit accepted - Indicates a concept can potentially be a 'risk' concept within an use-case - - Potential Risk - 2024-09-29 - - - - - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - - - - Incident is realised or materialised risk - 2024-02-14 - 2024-05-19 - Incident - An actual or occured event - - 2024-08-16 - accepted - - + 2022-08-18 - - - - - - - - accepted - + - - + + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High Harshvardhan J. Pandit - accepted - Low Risk (RM7x7 S:3 L:3) - 0.18,xsd:decimal + 0.73,xsd:decimal 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - - - Indicates the cause of associated context (subject) was the indicated threat (object) - 2024-02-14 - - accepted - - caused by threat - - - - - - - - 2022-08-17 - Harshvardhan J. Pandit - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - accepted - 0.12,xsd:decimal - - 2024-09-30 - + + + + - - + + + + + - Prejudice or discrimination against people based on their race + Harshvardhan J. Pandit + 2024-08-16 accepted - Racism - + Data Breach + + Concept representing Data Breach + 2022-08-17 + - + + - + + + + 2024-09-13 + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + ISO/IEC 24027:2021 accepted - 2022-08-17 - Moderate Risk (RM5x5 S:2 L:4) - 0.32,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Harshvardhan J. Pandit - + - - accepted - Extremely High Risk (RM7x7 S:7 L:6) - + + + + + + Psychological Harm + Concept representing Psychological Harm 2022-08-17 - 0.86,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - Harshvardhan J. Pandit - - - accepted - - - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - 2022-08-17 - 0.99,xsd:decimal - High Risk (RM3x3 S:3 L:3) - Harshvardhan J. Pandit - + 2024-08-16 + + - - accepted - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + modified + 2022-08-17 + + + - 2022-08-17 - High Risk (RM7x7 S:7 L:3) - 0.43,xsd:decimal - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - + Violating Statutory Obligations + + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2024-08-16 + Concept representing Violation of Statutory Obligations + + - - - + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - + - + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates accepted - Something that acts as or causes Harmful Speech - Exposure to Harmful Speech - 2022-08-17 - - This concept was called "HarmfulSpeech" in DPV 2.0 - Harshvardhan J. Pandit - 2024-08-16 - - - - Extremely Low Risk (RM7x7 S:1 L:2) - Harshvardhan J. Pandit + ISO 20501:2019 + Statistical Bias + 2024-09-13 + + + - + + 2024-02-14 + The state where an incident was almost successful in taking place i.e. "it came very close" + Harshvardhan J. Pandit accepted - 0.04,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - + + Incident Near Miss + - - + + + + + - 0.14,xsd:decimal - Low Risk (RM7x7 S:1 L:7) - 2022-08-17 - Harshvardhan J. Pandit + Stub accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - + Public Services Exclusion + 2024-10-21 + - - - + + + + Privacy accepted - Dislike, contempt, or prejudice against women - 2024-09-30 - Misogyny - + - - - - + + 2022-08-17 + - + + - - 2024-08-16 - - Something that acts as or causes a compromised account that is then used by the compromiser + Concept representing System Intrusion + System Intrusion Harshvardhan J. Pandit accepted - 2022-08-17 - Compromise Account - + + 2024-08-16 + + - + - - + + - 2024-08-16 - Something that acts as or provides payment e.g. to access a service or purchase resources + 2022-08-17 + Concept representing Loss of Trust + Lose of Trust + Harshvardhan J. Pandit + accepted - Payment - Georg P. Krog, Harshvardhan J. Pandit - accepted - 2024-04-14 - - - - Something that acts as or causes Loss of Negotiating Capacity - - - - - - - - Harshvardhan J. Pandit 2024-08-16 - accepted - Lose of Negotiating Capacity - - 2022-08-17 + - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + - + + + + - - modified - + 2022-08-17 Harshvardhan J. Pandit + Unauthorised Information Disclosure + + accepted 2024-08-16 - Something that acts as or causes Violation of Code of Conduct - Violating Code of Conduct - 2022-08-17 - + Concept representing Unauthorised Information Disclosure + + - + Harshvardhan J. Pandit - 2024-08-16 - + accepted + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + 0.24,xsd:decimal - - - - - + - Sabotage - accepted - Something that acts as or causes Sabotage 2022-08-17 - - + - + + accepted + has vulnerability + + + + Indicates the associated context (subject) has indicated vulnerability (object) + 2024-02-14 + + + + + accepted + + + + + - Confidentiality Concept - - 2024-09-29 - Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + Concept representing accidental misuse (of something) + Accidental Misuse + + + + + + + Indicates the vulnerability (subject) is associated with indicated context (object) + accepted + is vulnerability of - This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + + 2024-02-14 + + + 2022-08-17 Harshvardhan J. Pandit + + + + + + + accepted + Concept representing Impact to Rights + + 2024-08-16 + Rights Impact + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + - + + Moderate Severity + 0.5,xsd:decimal - Very High Severity Harshvardhan J. Pandit - - Level where Severity is Very High - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 accepted + 2022-08-18 + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + Level where Severity is Moderate + - - - - - + + + + - Excellence Discrimination - accepted - 2024-09-30 - - Favoritism towards individuals deemed more competent or superior, often at the expense of others - - - + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2024-08-16 + Concept representing Violation of Contractual Obligations + modified + Violating Contractual Obligation 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High Harshvardhan J. Pandit - High Risk (RM5x5 S:5 L:3) + + + + + + + + + - - 0.60,xsd:decimal + + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others accepted - + Malicious Activity + - - accepted + + - - Incident caused due to deliberate actions of a human - Deliberate Incident - 2024-05-19 + Harshvardhan J. Pandit + accepted + Monitor Risk + Control that monitors a Risk + 2024-05-19 + - - 2022-08-18 + - + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + Incident Mitigation Measure + accepted - Scale with 5 Severity Levels from Very High to Very Low - Harshvardhan J. Pandit - 5 Severity Levels - + 2024-05-19 - - 2024-02-14 - - accepted - has incident - - - - - Indicates an incident is associated with the specified context + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 - - Harshvardhan J. Pandit - 2024-08-16 - - + - + + + - + 2024-09-13 + ISO/IEC 24027:2021 + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + Non-Response Bias accepted - 2022-08-17 - - Lose of Opportunity - Something that acts as or causes Loss of Opportunity - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + - - - - + - + - 2024-09-30 - Age Discrimination + Very Low Risk (RM7x7 S:6 L:1) + 2022-08-17 - Discrimination based on a person's age, often impacting older or younger individuals + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + Harshvardhan J. Pandit accepted - + 0.12,xsd:decimal + - - + + - Harshvardhan J. Pandit - Scale with 7 Severity Levels from Extremely High to Extremely Low + 2024-02-14 + Harshvardhan J. Pandit accepted - 2022-08-18 - 7 Severity Levels - + Incident Ongoing + The incident is ongoing i.e. still active + - - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + 2022-08-17 + + 0.51,xsd:decimal Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low accepted - Extremely Low Risk (RM7x7 S:3 L:1) - 0.06,xsd:decimal - 2022-08-17 + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 2022-08-17 - - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - + + + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - Harshvardhan J. Pandit - - 2024-08-16 accepted - - + Societal Health & Safety + - + - - Reduce Likelihood - Control that reduces the likelihood of an event + 2024-09-29 + Potential RiskSource Harshvardhan J. Pandit - 2024-05-19 - + Indicates a concept can potentially be a 'risk source' concept within an use-case accepted - - - - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - - - - 2024-05-19 - accepted - Share Risk - Harshvardhan J. Pandit - + PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + - - 2022-08-17 - - - - - + - Something that acts as or causes Identity Fraud - Harshvardhan J. Pandit - 2024-08-16 + Risk Assessment + accepted - Identity Fraud - - + Assessment of risk involving its identification, analysis, and evaluation + ISO 31073:2022 Risk management vocabulary + 2024-02-14 - - - - + + - 2022-08-17 - modified - Violation of Contractual Obligation Harshvardhan J. Pandit - 2024-08-16 + accepted - - Something that acts as or causes Violation of Contractual Obligations - This concept was called "ViolationContractualObligations" in DPV 2.0 - + Risk Mitigation Measure that controls Impacts + Impact Control + 2024-05-19 + - - Harshvardhan J. Pandit + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + accepted + High Risk (RM5x5 S:4 L:3) - accepted - Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + 0.48,xsd:decimal 2022-08-17 - 0.04,xsd:decimal + Harshvardhan J. Pandit - - accepted - 2024-04-14 - - - - - - - Something that acts as or provides compensation - which can be monetary and financial or in other forms - 2024-08-16 - Compensation - Georg P. Krog, Harshvardhan J. Pandit - - - - - 2024-05-19 - accepted - - - A report describing the assessment of an incident in terms of its effects or impacts - Incident Assessment Report - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - 2022-08-17 - - - + + Risk Mitigation Measure that controls the Consequences - + - 2024-08-16 + 2024-05-19 Harshvardhan J. Pandit - Cryptojacking accepted - Something that acts as or causes Cryptojacking - + Consequence Control + - - + + 0.75,xsd:decimal + - 2022-08-17 - 0.99,xsd:decimal - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + High Likelihood + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 Harshvardhan J. Pandit accepted - + 2022-08-18 + Level where Likelihood is High + + + - - Something that acts as or causes System Intrusion - 2022-08-17 - - + + + Concept representing Security Breach + Harshvardhan J. Pandit + + + - System Intrusion - + accepted + Security Breach 2024-08-16 - Harshvardhan J. Pandit - accepted - + 2022-08-17 + - - - - - - + + 0.71,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - + + Extremely High Risk (RM7x7 S:7 L:5) 2022-08-17 - 2024-08-16 Harshvardhan J. Pandit - - - accepted - Something that acts as or causes Data Breach - - Data Breach - - - - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - - - - 2024-09-13 - Informativeness Bias - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - ISO/IEC 24027:2021 - accepted - - - - - 2024-08-16 - - - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk accepted - Risk Source - - 2024-02-14 + - - - - - + + + Harshvardhan J. Pandit - 2024-08-16 - A limitation or restrictions on the scope or exercise of rights - This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - Georg P. Krog, Harshvardhan J. Pandit - 2022-08-18 - accepted - Limitation of Rights - - - + 0.18,xsd:decimal accepted - - - + Low Risk (RM7x7 S:3 L:3) 2022-08-17 - - 0.16,xsd:decimal - Harshvardhan J. Pandit - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - + + + Stub + - + - + - 2024-09-30 - - Sexism accepted - Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - + Personalisation Disabled + 2024-10-21 + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + + + http://www.w3.org/2004/02/skos/core + http://www.w3.org/2000/01/rdf-schema + + 10.5281/zenodo.12505841 + + + + + + + + + + + + Risk Concepts + https://w3id.org/dpv/risk + Georg P. Krog + Rob Brennan + Julio Fernandez + Axel Polleres + Beatriz Esteves + Fajar Ekaputra + Delaram Golpayegani + Daniel Doherty + Julian Flake + Harshvardhan J. Pandit + 2.1-dev + + Paul Ryan + Julian Flake + Harshvardhan J. Pandit + Beatriz Esteves + Delaram Golpayegani + Georg P. Krog + Rob Brennan + 2.1-dev + + RISK + risk + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + 2024-08-18 + + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + + 2022-08-14 + + http://purl.org/ontology/bibo/status/published + https://w3id.org/dpv/risk# - + + + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low Harshvardhan J. Pandit - 0.64,xsd:decimal + accepted + + 0.08,xsd:decimal + Extremely Low Risk (RM7x7 S:4 L:1) + + + - - Very High Risk (RM5x5 S:4 L:4) + An impact assessment associated with a incident + + Incident Impact Assessment + 2024-05-19 + Harshvardhan J. Pandit + accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + + + + + refers to risk + + 2024-02-14 + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + accepted - + + - - 2022-08-17 + Harshvardhan J. Pandit - Very High Risk (RM5x5 S:3 L:5) + accepted + 0.80,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - 0.60,xsd:decimal + 2022-08-17 + Very High Risk (RM5x5 S:4 L:5) - - - Harshvardhan J. Pandit + + + + + + - - Avoid Source - Control that avoids the risk source + Harshvardhan J. Pandit accepted - 2024-05-19 - + + 2024-08-16 + Concept representing Account Credentials to be compromised + + 2022-08-17 + Compromise Account Credentials + - + accepted - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy + + Harshvardhan J. Pandit + - + - - - - - + + Concept representing Physical Assault + 2024-08-16 2022-08-17 - - - - - + Physical Assault + + + + + + + - 2024-08-16 - Brute Force Authorisations - - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - Harshvardhan J. Pandit + Something that involves or causes judicial penalties to be paid + Judicial Penalty accepted - + + - - + + 2022-08-17 - 0.57,xsd:decimal - Harshvardhan J. Pandit - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High accepted - + + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + 0.16,xsd:decimal + Low Risk (RM5x5 S:2 L:2) + - + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - Source Control - + + + + + - + - Harshvardhan J. Pandit - 2024-05-19 accepted - Risk Mitigation Measure that controls the Source - - - - Very Low Severity - Harshvardhan J. Pandit + Harshvardhan J. Pandit + 2024-08-16 + Unauthorised Code Modification + + 2022-08-17 + Concept representing Unauthorised Code Modification + + + + - + + + + + + + 2022-08-17 + Harshvardhan J. Pandit accepted - 2022-08-18 - 0.1,xsd:decimal - Level where Severity is Very Low - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - - + + Concept representing Unwanted Code Deletion + 2024-08-16 + Unwanted Code Deletion + - - Harshvardhan J. Pandit - Very Low Risk (RM7x7 S:2 L:3) + - + + + + + + - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 0.12,xsd:decimal + Spoofing 2022-08-17 + + Harshvardhan J. Pandit + accepted - + Concept representing Spoofing + 2024-08-16 + - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - 2022-08-17 - Very High Risk (RM7x7 S:4 L:6) + + accepted + Very Low Risk (RM7x7 S:1 L:6) + 0.12,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + 2022-08-17 Harshvardhan J. Pandit - 0.49,xsd:decimal - accepted - - - - + + + + + + Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract + 2024-10-21 + Violating Prohibition accepted - 2022-08-18 - 0.75,xsd:decimal - High Severity - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - Harshvardhan J. Pandit - Level where Severity is High - - - + + - - + + 2022-08-17 + - 2022-08-18 - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - Harshvardhan J. Pandit accepted - - - - Harshvardhan J. Pandit - 2024-08-16 - Copyright Violation + Very Low Risk (RM5x5 S:2 L:1) - - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + 0.08,xsd:decimal + + + + + - - Something that acts as or causes Copyright Violation - accepted - 2022-08-17 - - - - - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - accepted - + - Incident Mitigated - 2024-02-14 + Technical Risk Concept + accepted + 2024-10-21 + Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes - Harshvardhan J. Pandit - + Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + - + 2024-08-16 - - Harshvardhan J. Pandit - Something that acts as or causes Terrorism - - - - + + + - Terrorism + Concept representing a misuse (of something) + Misuse + 2024-06-11 + Delaram Golpayegani accepted - 2022-08-17 - + + - - Something that acts as or causes Loss of Credibility - 2022-08-17 + 2024-08-16 - - - - + Concept representing Identity Theft + + + + + + - Lose of Credibility - Harshvardhan J. Pandit + 2022-08-17 + Identity Theft + Harshvardhan J. Pandit accepted - - + - - 2024-08-16 - - Unauthorised Information Disclosure - - + + - + + + + Confidentiality Breach + 2022-08-17 + Concept representing Confidentiality Breach Harshvardhan J. Pandit accepted - Something that acts as or causes Unauthorised Information Disclosure - - 2022-08-17 - + + 2024-08-16 + - - + + Risk Matrix + 2024-02-14 - The state where an incident was almost successful in taking place i.e. "it came very close" - Incident Near Miss Harshvardhan J. Pandit - accepted - + + + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + - - - http://www.w3.org/2004/02/skos/core - http://www.w3.org/2000/01/rdf-schema - - https://w3id.org/dpv/risk# - 2022-08-14 - - - - - - - - - RISK - Daniel Doherty - Georg P. Krog - Julian Flake - Fajar Ekaputra - Harshvardhan J. Pandit - Axel Polleres - Julio Fernandez - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - - 2022-08-14 - Harshvardhan J. Pandit - Julian Flake - Delaram Golpayegani - Beatriz Esteves - Rob Brennan - Georg P. Krog - Paul Ryan - 2.1-dev - - - - - - - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - http://purl.org/ontology/bibo/status/published - 2.1-dev - - Risk Concepts - 10.5281/zenodo.12505841 - risk - 2024-08-18 - - https://w3id.org/dpv/risk - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 - - 2022-08-17 - - - - - + + + 0.32,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + Moderate Risk (RM5x5 S:4 L:2) + - - Something that acts as or causes Identity Theft - Identity Theft - 2024-08-16 - + 2022-08-17 Harshvardhan J. Pandit accepted - + - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + Extremely High Risk (RM7x7 S:5 L:6) + 0.61,xsd:decimal + + + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High Harshvardhan J. Pandit accepted - - - + + + + - - Impact to Rights - 2022-08-17 - This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - - 2024-08-16 - Something that acts as or causes Impact to Rights + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - + 0.99,xsd:decimal + Harshvardhan J. Pandit + accepted + 2022-08-17 + Very High Risk (RM5x5 S:5 L:5) + - - - + + + + + - - Failure to meet or complete the fulfilment of rights - Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - Unfulfilment of Rights + Harshvardhan J. Pandit + accepted - - - + Concept representing Blackmail + Blackmail + 2024-08-16 2022-08-17 - Moderate Risk (RM3x3 S:1 L:3) - + + + + Very Low Likelihood - + + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 Harshvardhan J. Pandit accepted - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - 0.33,xsd:decimal - + + 2022-08-18 + Level where Likelihood is Very Low + 0.1,xsd:decimal + + - + + Unauthorised Activity + + + + + + + + + + Concept representing Unauthorised Activity + + accepted + + + + Control that monitors a Risk Impact + + + + Harshvardhan J. Pandit + + 2024-05-19 + accepted + Monitor Impact + + + + 2022-08-17 + + + + + Harshvardhan J. Pandit + High Risk (RM7x7 S:4 L:4) + accepted + 0.33,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + + + + + + Control to recover from event + 2024-05-19 + + accepted + Recovery Control + + + + ISO/IEC 24027:2021 + 2024-09-13 + + + + + + + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + Out-Group Homogeneity Bias + accepted + + + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + + + Extremely Low Risk (RM7x7 S:2 L:2) + 2022-08-17 + accepted + Harshvardhan J. Pandit + + 0.08,xsd:decimal + + + + + + + + + + Discrimination based on a person's age, often impacting older or younger individuals + 2024-09-30 + accepted + + Age Discrimination + + + + + + + Risk Concepts - HTML serialiation + + + + + Very Low Risk (RM5x5 S:3 L:1) + 2022-08-17 + + + + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + Harshvardhan J. Pandit + accepted + + 0.12,xsd:decimal + + + + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + + + + 2022-08-17 + 0.24,xsd:decimal + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:6 L:2) + accepted + + + + + has threat source + + + + + + + 2024-02-14 + Indicates the threat (subject) has the indicated source (object) + + accepted + + + + + + + + + accepted + + 2024-10-21 + Service Not Provided + Stub + + + + + + + 2022-08-17 + Harshvardhan J. Pandit + + accepted + 0.61,xsd:decimal + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + + + accepted + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + + + 2022-08-17 + High Risk (RM7x7 S:3 L:6) + 0.37,xsd:decimal + Harshvardhan J. Pandit + + + + + Malware Attack + + + + + + + + + accepted 2024-08-16 + + Concept representing Malware Attack + 2022-08-17 + Harshvardhan J. Pandit + + + + Scale with 7 Severity Levels from Extremely High to Extremely Low + + + + Harshvardhan J. Pandit + + accepted + 2022-08-18 + 7 Severity Levels + + + + + + + + Harshvardhan J. Pandit + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + accepted + 0.04,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + 2022-08-17 + + + + + 2024-05-19 + Harshvardhan J. Pandit + accepted + Monitor Control + + + + Control that monitors another Control + + + + 2022-08-17 + + + + Extremely Low Risk (RM7x7 S:1 L:1) + + Harshvardhan J. Pandit + accepted + 0.02,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + + + + + + 2022-08-17 + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:3 L:1) + accepted + + 0.06,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + + + + + + + + + Harassment + + accepted + + + Harshvardhan J. Pandit - + + + + + + + accepted + + + 2024-08-16 + Concept representing Unauthorised Code Access + Unauthorised Code Access + 2022-08-17 + + + + + + + + + Stub + accepted + + Service Denied + 2024-10-21 + + + + + + + Low Severity + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 0.25,xsd:decimal + Harshvardhan J. Pandit + accepted + Level where Severity is Low + 2022-08-18 + + + + + + + 2024-02-14 + + + + Indicates the risk (subject) has the indicated risk source (object) + + has risk source + accepted + + + + + + accepted + + + + + Control that removes Impact i.e. prevents it from materialising + Remove Impact + 2024-05-19 + Harshvardhan J. Pandit + + + + + + + + Risk Concepts - RDF/XML serialiation + + + + + + + + Concepts associated with risks that arise due to User or Human use + User Risks + accepted + + + + + + + + + + + Discrimination against individuals because of their racial background or skin color + Racial Discrimination + 2024-09-30 + + accepted + + + + Level where Risk is Very Low + + Harshvardhan J. Pandit + accepted + 2022-08-18 + + + + Very Low Risk + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + + + + + accepted + This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact + Integrity Concept + + Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + 2024-09-29 + + + + Harshvardhan J. Pandit + + + + + - + + Concept representing Public Order Breach + 2022-08-17 + Harshvardhan J. Pandit accepted - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access + + 2024-08-16 + Public Order Breach + + + 2022-08-17 + Extorsion + + + + + + + + + Harshvardhan J. Pandit + accepted - + 2024-08-16 + Concept representing Extorsion + - - Out-Group Homogeneity Bias + + Notice associated with an Incident + + + accepted + + 2024-05-19 + + Incident Notice + + + https://www.iso.org/standard/75281.html + + ISO/IEC 27005:2018 + + + + + + + + Interference with or blocking of the exercise of rights + accepted + + Rights Obstructed + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + + + 2024-09-30 + - + + + + + accepted + + Dislike, contempt, or prejudice against men + Misandry + + + + + + + accepted + + Control that modifies risk + 2024-05-19 + + Risk Control + + + + + + Control that reduces the likelihood of an event + Harshvardhan J. Pandit + accepted + 2024-05-19 + + Reduce Likelihood + + + + + + - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Sexism + accepted + + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + 2024-09-30 + + + + Harshvardhan J. Pandit + accepted + + Indicates a concept can potentially be a 'risk' concept within an use-case + + 2024-09-29 + + + Potential Risk + PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + + + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + accepted + + + + + 0.01,xsd:decimal + 2022-08-18 + Level where Risk is Extremely Low + Extremely Low Risk + + + + + + + 2022-08-17 + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM3x3 S:3 L:2) - 2024-09-13 + Harshvardhan J. Pandit accepted - ISO/IEC 24027:2021 - + 0.67,xsd:decimal + - - + + + accepted + + + + + + 2024-10-21 + Identity Verification Failure + Concept representing failure to verify identity + + + - + + + - 2024-09-30 - Hostility or prejudice against individuals who are or are perceived to be homosexual + 2022-08-17 + Harshvardhan J. Pandit + Lose of Reputation accepted - Homophobia - + 2024-08-16 + + Concept representing Loss of Reputation + - + + + - + accepted - 2024-08-16 - Violation of Rights - The infringement or breach of rights in a manner that constitues a 'violation' of those rights - Georg P. Krog, Harshvardhan J. Pandit + 2024-10-21 + Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation + Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + Legal Risk Concept + + + + + 2024-02-14 + + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + accepted - 2022-08-18 - This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - + exploits vulnerability + + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - accepted - - + + - - + + - Blackmail - 2022-08-17 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Something that acts as or causes Blackmail - Harshvardhan J. Pandit - 2024-08-16 - + 2024-09-13 + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + ISO/IEC 24027:2021 + - - 2022-08-17 - - - - - + + + + + - Harshvardhan J. Pandit - - 2024-08-16 - + Risks and issues that have their origin in environment or can affect the environment at large + Environmental Risk accepted - Something that acts as or causes Authorisation Failure - Authorisation Failure - + + 2024-10-21 + - + + 2024-09-30 + + + - + - Control that reduces the likelihood or severity of an event - 2024-05-19 + accepted + + Direct Discrimination + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + + + + + + + Risk Concepts - N3 serialiation + + + + + 2022-08-18 accepted - Reduction Control - + + + + Scale with 5 Likelihood Levels from Very High to Very Low + 5 Likelihood Levels + Harshvardhan J. Pandit + - - + + 2022-08-17 - Harshvardhan J. Pandit - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:1 L:3) accepted - 0.29,xsd:decimal + 0.06,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - Georg P. Krog, Harshvardhan J. Pandit - accepted - + + + - - - 2024-04-14 - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form - 2024-08-16 - - - - - - - - - - - 2022-08-19 + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals - Unauthorised Re-Identification - 2024-08-16 accepted - Georg P. Krog - Something that acts as or causes Unauthorised Re-Identification - + - - accepted - 0.24,xsd:decimal - Moderate Risk (RM7x7 S:4 L:3) - + + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + 0.41,xsd:decimal Harshvardhan J. Pandit + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + accepted - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + + This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 + + + + Harshvardhan J. Pandit + accepted + Indicates a concept is relevant to 'Availability' in CIA InfoSec model + + Availability Concept - - + + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + - 2022-08-17 - High Risk (RM5x5 S:3 L:4) + Moderate Likelihood + 0.5,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 0.48,xsd:decimal + Level where Likelihood is Moderate Harshvardhan J. Pandit accepted - + 2022-08-18 + + + - - + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - High Risk (RM7x7 S:4 L:4) 2022-08-17 - Harshvardhan J. Pandit + 0.04,xsd:decimal + accepted - 0.33,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:1) - - 2024-09-30 - + + 2024-09-13 - - + + + - + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + ISO/IEC 24027:2021 accepted - Discrimination based on a person's caste, a form of social stratification found in some cultures - Caste Discrimination - + + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Data Aggregation Bias + - + + 2022-08-17 - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate Harshvardhan J. Pandit - Moderate Risk (RM7x7 S:3 L:4) accepted - 0.24,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + 0.10,xsd:decimal + Very Low Risk (RM7x7 S:1 L:5) - - - - accepted - - - is exploited by - - - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - 2024-02-14 - - - - + + Low Risk (RM5x5 S:5 L:1) + 0.20,xsd:decimal + 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - Low Risk (RM5x5 S:1 L:5) Harshvardhan J. Pandit - 0.20,xsd:decimal - accepted + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - - - + + - - - 2024-08-16 Harshvardhan J. Pandit - Denial of Service Attack (DoS) - accepted - Something that acts as or causes Denial of Service Attack (DoS) + + 0.10,xsd:decimal + Very Low Risk (RM7x7 S:5 L:1) 2022-08-17 - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + - - - Incident Register + + Moderate Risk (RM3x3 S:1 L:3) + 0.33,xsd:decimal + + + + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + 2022-08-17 Harshvardhan J. Pandit - A register recording incidentes, their reports, notifications, and other related activities - 2024-05-19 + accepted + + + + Very Low Risk (RM7x7 S:3 L:2) + + 2022-08-17 + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + accepted + 0.12,xsd:decimal + - + + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + Incident Suspected + + + + 2024-02-14 Harshvardhan J. Pandit - + accepted + + + + Discrimination based on a person's biological sex + + + + + Sex Discrimination + 2024-09-30 accepted - 2022-08-18 - Scale with 7 Risk Levels from Extremely High to Extremely Low - 7 Risk Levels - + + - + - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - Very Low Risk (RM5x5 S:2 L:1) - 2022-08-17 - 0.08,xsd:decimal Harshvardhan J. Pandit + Very High Risk (RM7x7 S:4 L:6) accepted - + 0.49,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + 2022-08-17 + - - - + + Harshvardhan J. Pandit - Low Risk (RM3x3 S:1 L:2) accepted + + 0.64,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Very High Risk (RM5x5 S:4 L:4) 2022-08-17 - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - 0.22,xsd:decimal - + - - - - - + + - ISO 20501:2019 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + 0.71,xsd:decimal - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - 2024-09-13 - Statistical Bias + Extremely High Risk (RM7x7 S:5 L:7) + Harshvardhan J. Pandit accepted - + - - 2022-08-17 - + + Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal + 2024-08-16 + - - + - + + - - - Harshvardhan J. Pandit - Something that acts as or causes Unauthorised Resource Use - 2024-08-16 + 2022-03-23 + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Concept representing benefits - both material and immaterial + Benefit accepted - Unauthorised Resource Use - + - - - - - - - + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + - - + Level where Risk is High + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 accepted - Something that acts as or causes Unauthorised Activity - Unauthorised Activity - + + 2022-08-18 + High Risk + 0.75,xsd:decimal + + + - - + + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + ISO/IEC 24027:2021 + + - + - Legal Risk - accepted - Risks and issues that have their basis in legal requirements and enforcement - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + 2024-09-13 + Rule based system design also potentially introduces various forms of human cognitive bias + Rule-Based System Design + - + + + 2024-02-14 + + + Indicates the use of specified control + has control accepted - 2022-08-18 - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - Level where Likelihood is Extremely High - + + + + + + + 2022-08-17 + Unauthorised Code Disclosure + + + + + - Extremely High Likelihood - 0.99,xsd:decimal + Concept representing Unauthorised Code Disclosure Harshvardhan J. Pandit + accepted - + 2024-08-16 + - - - - - + + 2024-10-21 + Inability to Enter Into Contract + + + + - In-Group Bias - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when showing partiality to one's own group or own characteristics - - 2024-09-13 + Stub accepted - + + - - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - + - - - + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + 0.41,xsd:decimal + Harshvardhan J. Pandit accepted - Simpson'S Paradox Bias - 2024-09-13 - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + High Risk (RM7x7 S:4 L:5) + - - 2024-09-13 - Rule-Based System Design - + + - + + - - ISO/IEC 24027:2021 - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted - Rule based system design also potentially introduces various forms of human cognitive bias - + 2024-10-21 + The occurence or potential occurence of floods + Floods + - - + - - - + - + Control that reduces the likelihood or severity of an event + Reduction Control accepted - 2024-09-13 - ISO/IEC 24027:2021 - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Societal Bias - - - - 2024-02-14 - caused by vulnerability + 2024-05-19 - accepted - - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - + - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + - + + + + + - Level where Risk is Very High - 2022-08-18 + 2022-08-17 + Unwanted Disclosure of Data + Concept representing Unwanted Disclosure of Data Harshvardhan J. Pandit + 2024-08-16 + accepted - Very High Risk - - + - - accepted - + + Risk Concepts - JSON-LD serialiation + + + + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + 0.33,xsd:decimal + Moderate Risk (RM3x3 S:3 L:1) + - Extremely Low Risk (RM7x7 S:4 L:1) 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.08,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate Harshvardhan J. Pandit - + accepted + - + + + + + + accepted + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + caused by vulnerability + 2024-02-14 + + + - Harshvardhan J. Pandit + 3 Severity Levels accepted - 0.12,xsd:decimal - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - 2022-08-17 - + + 2022-08-18 + Scale with 3 Severity Levels from High to Low + - - 2022-08-17 - - - + + Unauthorised Data Disclosure + + + + + - modified - 2024-08-16 - This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 Harshvardhan J. Pandit + accepted - Something that acts as or causes Violation of Ethics Code - Violating Ethics Code - - + Concept representing Unauthorised Data Disclosure + + 2024-08-16 + - - - - + + Harshvardhan J. Pandit + High Risk (RM5x5 S:3 L:4) + accepted - + + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + 2022-08-17 + 0.48,xsd:decimal - accepted - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + - - + + Moderate Risk (RM5x5 S:3 L:3) + - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low 2022-08-17 - Low Risk (RM7x7 S:2 L:4) - - 0.16,xsd:decimal Harshvardhan J. Pandit accepted - + + 0.36,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + - - Containment Control - Control to contain event - - - - 2024-05-19 + + Harshvardhan J. Pandit accepted - - - + 0.20,xsd:decimal - accepted - 0.51,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Low Risk (RM7x7 S:2 L:5) 2022-08-17 - - Very High Risk (RM7x7 S:5 L:5) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - accepted - - - - - + + + Harshvardhan J. Pandit + Level where Severity is Extremely High + accepted - + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 0.99,xsd:decimal + 2022-08-18 + Extremely High Severity + - - User Risks - Concepts associated with risks that arise due to User or Human use - - + - - - - accepted - - - - 2024-08-16 - - - - + + + - Harshvardhan J. Pandit accepted - - Something that acts as or causes Unauthorised Data Disclosure - Unauthorised Data Disclosure - 2022-08-17 - + - - Harshvardhan J. Pandit + + Low Risk (RM3x3 S:1 L:2) - 0.08,xsd:decimal - - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - Very Low Risk (RM5x5 S:1 L:2) 2022-08-17 - - - Harshvardhan J. Pandit + accepted + 0.22,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - Potential Consequence + + + + + accepted - Indicates a concept can potentially be a 'consequence concept within an use-case - - PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - 2024-09-29 + A report describing the suspicion of an incident in the past or occuring + 2024-05-19 + Incident Suspected Report - - + + - Moderate Risk (RM7x7 S:2 L:6) - 2022-08-17 - Harshvardhan J. Pandit + Incident Concluded accepted - 0.24,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - - - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - ENISA Threat Taxonomy 2016 + + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + 2024-02-14 + - + - accepted + Risk Matrix 7x7 2022-08-17 - 0.40,xsd:decimal - - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types Harshvardhan J. Pandit - High Risk (RM5x5 S:2 L:5) - - - + accepted - Harshvardhan J. Pandit - + + + + 2024-10-21 + + + + - 2022-08-18 - Extremely High Risk + Inability to Process Payments + + Stub accepted - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - Level where Risk is Extremely High - 0.99,xsd:decimal - + - - 2022-08-17 - Violation of Legal Obligations - - Something that acts as or causes Violation of Legal Obligations - - + + + + + + - modified - 2024-08-16 + 2022-08-17 + Unauthorised System Access Harshvardhan J. Pandit - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + accepted - + 2024-08-16 + + Concept representing Unauthorised System Access + - - 2022-08-17 - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - Harshvardhan J. Pandit + + Disability Discrimination + accepted + + - + + + Discrimination against individuals based on physical or mental disabilities + 2024-09-30 + + + accepted - 0.24,xsd:decimal - + 2022-08-18 + + Scale with 5 Severity Levels from Very High to Very Low + 5 Severity Levels + + + + Harshvardhan J. Pandit + - - 2022-08-17 - Coercion - - - - - + + High Risk (RM7x7 S:7 L:3) + 0.43,xsd:decimal + - 2024-08-16 + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High Harshvardhan J. Pandit accepted - Something that acts as or causes Coercion - - + - + + 0.29,xsd:decimal + + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + Harshvardhan J. Pandit + accepted + + Moderate Risk (RM7x7 S:2 L:7) + + + - + + - + - Lose of Reputation + 2024-09-30 + Dislike, contempt, or prejudice against women accepted - 2022-08-17 - - 2024-08-16 - Something that acts as or causes Loss of Reputation - Harshvardhan J. Pandit - + Misogyny + - - - - + - + + + + + - Environmental Risk + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Component Failure accepted - Risks and issues that have their origin in environment or can affect the environment at large - + Concept representing Component Failure + - + + https://www.iso.org/standard/72140.html - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + IEC 31010:2019 - - - - - - + + - - 2022-08-17 + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low Harshvardhan J. Pandit - 2024-08-16 - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - accepted - - - - Primer for Data Privacy Vocabulary - - - - - + 2022-08-18 + + - + + + - + + + 2024-08-16 + + Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + Human Errors + 2022-08-17 Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 accepted - Level where Likelihood is Very High - 0.9,xsd:decimal - 2022-08-18 - Very High Likelihood - - + - + + accepted + Level where Likelihood is Low + 2022-08-18 + - - - - - 2024-09-13 - ISO/IEC 24027:2021 - Data Aggregation Bias - accepted - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Low Likelihood + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Harshvardhan J. Pandit + + + - + - - + + - Reputational Risk - Risks and issues that affect the reputation of the organisation + + accepted + Something that acts as or provides compensation - which can be monetary and financial or in other forms + 2024-04-14 + Compensation + Georg P. Krog, Harshvardhan J. Pandit + 2024-08-16 + + + + ISO 31073:2022 Risk management vocabulary + + + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + accepted + 2024-06-12 - - - + + + + + - 2022-08-18 - Moderate Risk - Level where Risk is Moderate - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + This concept refers to the general abstract notion of harm - Harshvardhan J. Pandit + 2024-08-16 accepted - 0.5,xsd:decimal - - - + Concept representing Harm to humans + Harm + 2022-08-13 + Harshvardhan J. Pandit + - + + + + - - - Harshvardhan J. Pandit - - - Something that acts as or causes Physical Assault + Service Alternative Offered + 2024-10-21 + Stub accepted - Physical Assault - 2022-08-17 - 2024-08-16 - + - - + + - 2022-08-17 - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.11,xsd:decimal + Control that reduces the severity of an event Harshvardhan J. Pandit accepted - - - 2024-05-19 + Reduce Severity + + + + Stub + + + + + + + accepted - Harshvardhan J. Pandit + Personalisation Enabled + 2024-10-21 + + + accepted - Remove Consequence - + + 2024-05-19 + - Control that removes Consequence i.e. prevents it from materialising - + Remedy Control + Control to remedy consequences of event + - + + Harshvardhan J. Pandit + + - + + - Impact Control - - 2024-05-19 accepted - Harshvardhan J. Pandit - Risk Mitigation Measure that controls Impacts - + 2024-08-16 + Concept representing Denial of Service Attack (DoS) + Denial of Service Attack (DoS) + 2022-08-17 + + + - - accepted + + + + - + - Control that changes Consequence - 2024-05-19 - Change Consequence - Harshvardhan J. Pandit + accepted - - - - - Risk Concepts - JSON-LD serialiation - - - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + 2024-10-21 + Service Partially Provided + Stub + - - + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - + + + 2024-09-30 - Indirect Discrimination - Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified accepted + Indirect Discrimination - - A report describing the detection of a Incident - - 2024-05-19 - - Incident Detection Report + + + 2022-08-17 + Harshvardhan J. Pandit accepted - - - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - 2024-05-19 - Incident Ongoing Report + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + 0.20,xsd:decimal + Low Risk (RM7x7 S:5 L:2) + + + + 2024-10-21 + + + + + Stub accepted + + Inability to Establish Legal Claims + - + + - + - accepted - Control that changes Impact - 2024-05-19 - + Very Low Risk (RM5x5 S:1 L:2) + 2022-08-17 Harshvardhan J. Pandit - Change Impact - + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + 0.08,xsd:decimal + - - + + + + + - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - 7 Likelihood Levels + 2022-08-18 + A limitation or restrictions on the scope or exercise of rights - Harshvardhan J. Pandit accepted - 2022-08-18 - + Rights Limited + 2024-08-16 + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Georg P. Krog, Harshvardhan J. Pandit + - - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low - + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + 2022-08-17 + 0.14,xsd:decimal Harshvardhan J. Pandit - accepted - 2022-08-18 - - - - Control to recover from event - Recovery Control + Low Risk (RM7x7 S:7 L:1) + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + - + accepted + 2024-05-19 - + Deliberate Incident + Incident caused due to deliberate actions of a human - - - 2024-05-19 - Incident Concluding Report - + + + + + + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + Reverse Discrimination + 2024-09-30 accepted - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + - - - - + + Control that changes Impact - + - 2024-08-16 Harshvardhan J. Pandit accepted - Something that acts as or causes Non-Material Damage - 2022-03-30 - Non-Material Damage - The criteria for what is considered material damage is based in jurisdictional laws and norms - + 2024-05-19 + Change Impact + - - - - - + + - 2024-09-30 - Discrimination against individuals based on their ethnicity or cultural heritage - + Scale with 3 Likelihood Levels from High to Low + Harshvardhan J. Pandit accepted - Ethnic Discrimination - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - + + 2022-08-18 + 3 Likelihood Levels + - + + Harshvardhan J. Pandit accepted + - - Incident Report - Documented information about an incident, its handling, assessments,and notifications - 2024-05-19 + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + High Risk (RM7x7 S:6 L:3) + 0.37,xsd:decimal + - - - - - - Risk Concepts - RDF/XML serialiation - - - - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 0.1,xsd:decimal - - + + - Harshvardhan J. Pandit - Very Low Risk - 2022-08-18 + Control to detect event + Detection Control + accepted - Level where Risk is Very Low - - - - - Incident Notice 2024-05-19 - + + + + + + + + accepted - Notice associated with an Incident - + Legally Relevant Consequence + A consequence that is legally relevant i.e. actionable under law + - - Remove Impact + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Control that monitors a Risk Vulnerability + Harshvardhan J. Pandit accepted - Control that removes Impact i.e. prevents it from materialising + Monitor Vulnerabilities 2024-05-19 - Harshvardhan J. Pandit - + - + - - - - + + + - Harshvardhan J. Pandit - Something that acts as or causes Account Credentials to be compromised - 2024-08-16 + Stub accepted - Compromise Account Credentials - 2022-08-17 - - + 2024-10-21 + Legal Support Limited + - - Malware Attack - - - + + - - + + + + - 2022-08-17 - Something that acts as or causes Malware Attack - - - 2024-08-16 - Harshvardhan J. Pandit accepted - + Concept representing Component Malfunction + Component Malfunction + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + - - + + + + - + - + Concept representing an attack on security with the aim of undermining it accepted - Intentional Misuse - Intentional Misuse - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + Security Attack + - - Something that acts as or causes Unauthorised System Access - 2022-08-17 - - - + + accepted - - - + + + - + Georg P. Krog, Harshvardhan J. Pandit 2024-08-16 - Harshvardhan J. Pandit + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 + + + + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types accepted - Unauthorised System Access - + + + + + Risk Matrix 3x3 + 2022-08-17 + Harshvardhan J. Pandit + - - Physical Harm - - - - + + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + 2024-05-19 + accepted - - - Risk Mitigation Measure that uses controls to monitor events - 2024-05-19 - - Harshvardhan J. Pandit + - - Monitor Control - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + Harshvardhan J. Pandit + PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case accepted - + + Indicates a concept can potentially be a 'impact' concept within an use-case + + Potential Impact + 2024-09-29 - - 2024-05-19 + - Control that modifies risk - Risk Control + + + + - + Societal Risk + Risks and issues that affect or have the potential to affect groups in society accepted - + - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - - - + + Harshvardhan J. Pandit accepted - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + Very High Risk (RM7x7 S:7 L:4) + - Control that removes the risk source - 2024-05-19 - Harshvardhan J. Pandit + 0.57,xsd:decimal + 2022-08-17 + + + + + + + + + + Reputational Risk + accepted + Risks and issues that affect the reputation of the organisation - Remove Source - + - + + Concept representing Scam - + + + + + - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + Scam 2022-08-17 Harshvardhan J. Pandit - Risk Matrix 5x5 - accepted - + + + 2024-08-16 + - + + Harshvardhan J. Pandit + 2024-08-16 + + + - + + - Control to detect event - 2024-05-19 + Here system refers to both hardware and software systems accepted - Detection Control - + System Malfunction + Concept representing System Malfunction + 2022-08-17 + + - - + + + + + + + accepted + + Physical Harm + + + + + + - + - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others accepted - 2024-09-13 - ISO/IEC 24027:2021 - Bias - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - + + - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring 2024-02-14 + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + Incident Mitigated Harshvardhan J. Pandit - - Incident Terminated accepted + - - 2024-02-14 - - Harshvardhan J. Pandit - The incident has halted or paused with a high likelihood of resuming or recurring + - + + + + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + The gradual weakening or reduction of the scope and protection of rights accepted - Incident Halted - + Rights Eroded + + - - Harshvardhan J. Pandit - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + - + Control to contain event accepted - Risk Mitigation Measure that controls the Consequences - Consequence Control 2024-05-19 + + Containment Control - + + 0.08,xsd:decimal - - - - + - 2024-09-13 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + Very Low Risk (RM7x7 S:1 L:4) + 2022-08-17 + Harshvardhan J. Pandit accepted - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Requirements bias also represents occasions for the human cognitive biases to manifest - Bias that occurs in or during requirements creation - Requirements Bias - + - + + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + Transphobia + + + + + + 2024-09-30 + + accepted + + + + 2024-05-19 - Harshvardhan J. Pandit - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability + accepted - + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Share Risk + - - - - - + + Very Low Severity + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + - - Harassment + Harshvardhan J. Pandit + Level where Severity is Very Low accepted - + 2022-08-18 + + + - - 2024-02-14 - + + Scale with 3 Risk Levels from High to Low + Harshvardhan J. Pandit accepted - Indicates the vulnerability (subject) is associated with indicated context (object) - is vulnerability of - - - + 2022-08-18 + + + + 3 Risk Levels + - - - + - + + + + Discrimination against individuals based on their ethnicity or cultural heritage + Ethnic Discrimination 2024-09-30 - Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - SexualOrientation Discrimination - accepted - - - - - accepted - - - - 2024-02-14 - Indicates the associated context (subject) has indicated vulnerability (object) - has vulnerability + - - 2024-09-29 - This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact - Availability Concept - - Harshvardhan J. Pandit + + Violating Policy + + + accepted - - Indicates a concept is relevant to 'Availability' in CIA InfoSec model + + Concept representing violation of policy which can be either internal or external policy + - - - - - + + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 + + - + + 0.86,xsd:decimal 2022-08-17 - Something that acts as or causes System Malfunction - System Malfunction - - 2024-08-16 - accepted - Harshvardhan J. Pandit - Here system refers to both hardware and software systems - - - - - - - Indicates the incident (subject) is a materialisation of the indicated risk (object) - 2024-02-14 - - - refers to risk - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Harshvardhan J. Pandit accepted - - - + + Extremely High Risk (RM7x7 S:7 L:6) + - - Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - + + + - - 2024-09-30 - accepted - Reverse Discrimination - + + Judicial Costs + Something that involves or causes judicial costs to be paid + - - - - - + + + Concept representing Sabotage + + + + + + 2022-08-17 + Harshvardhan J. Pandit accepted - Component Failure - Something that acts as or causes Component Failure - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - + 2024-08-16 + Sabotage + - - - Control to identify characteristics of event - 2024-05-19 - - - - Identification Control - accepted - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - Low Likelihood - 0.25,xsd:decimal - Level where Likelihood is Low - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - + + - + Harshvardhan J. Pandit + Low Risk (RM5x5 S:1 L:5) accepted - 2022-08-18 - - - - - - - Incident caused due to accidental actions arising from human or human-controlled situations - Accidental Incident - - - 2024-05-19 - accepted - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + 0.20,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + 2022-08-17 + - - + + + - accepted - Religious Discrimination - Discrimination based on a person's religious beliefs or practices - 2024-09-30 - + Customer Support Limited + 2024-10-21 + Concept representing customer support to be limited + - - - + + accepted + - + + + - - accepted - 2024-09-13 - ISO/IEC 24027:2021 - Bias that occurs when humans are processing and interpreting information - Cognitive Bias - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + Individual Health & Safety + - + + accepted + 0.12,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + Very Low Risk (RM5x5 S:1 L:3) - High Risk (RM7x7 S:5 L:4) 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High Harshvardhan J. Pandit - accepted - 0.41,xsd:decimal - + - - + - + + + + + 2022-08-17 + Concept representing erroneous use (of something) + Harshvardhan J. Pandit + Erroneous Use accepted - 0.04,xsd:decimal - 2022-08-17 - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - - - - - has control - 2024-02-14 - - - - Indicates the use of specified control - accepted + 2024-08-16 + - - 2024-02-14 - + + 2024-09-13 - + + + + + ISO/IEC 24027:2021 + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + Data Bias + accepted - Harshvardhan J. Pandit - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - Incident Concluded - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + - - - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + + - - 2024-06-11 - Delaram Golpayegani + Service Limited + Stub - 2024-08-16 - Something that acts as or causes Misuse accepted - Misuse - + 2024-10-21 + - - - Risk Matrix - + + 0.24,xsd:decimal + - 2024-02-14 - + 2022-08-17 accepted + Harshvardhan J. Pandit - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + - + + + + + + + + Stub + accepted + Inability to Fulfill Legal Obligations + 2024-10-21 + + + + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + 0.04,xsd:decimal Harshvardhan J. Pandit accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - 2022-08-17 - Very Low Risk (RM7x7 S:1 L:4) - 0.08,xsd:decimal + + Extremely Low Risk (RM7x7 S:1 L:2) - - - - - - + + + + + - Something that acts as or causes Unauthorised Code Modification - 2024-08-16 - - Harshvardhan J. Pandit accepted - - 2022-08-17 - Unauthorised Code Modification - - - - Control to remedy consequences of event - 2024-05-19 + 2024-04-14 + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + Something that acts as or provides payment e.g. to access a service or purchase resources + Payment + + + + accepted + + + - + - accepted - Remedy Control - + + Racism + Prejudice or discrimination against people based on their race + 2024-09-30 + - - + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + 2022-08-17 - 0.40,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - High Risk (RM5x5 S:5 L:2) + Moderate Risk (RM7x7 S:7 L:2) + 0.29,xsd:decimal Harshvardhan J. Pandit - accepted - + + - - + + + + + + Intentional Misuse + Concept represent an intentional misuse (of something) accepted - 0.33,xsd:decimal - 2022-08-17 - Moderate Risk (RM3x3 S:3 L:1) - Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - + - - + + High Risk (RM3x3 S:3 L:3) + - Very High Risk (RM5x5 S:5 L:5) 2022-08-17 - 0.99,xsd:decimal Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High accepted - + 0.99,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + - - - - - + + + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + 2024-02-14 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Group Attribution Bias - 2024-09-13 + Risk Source + 2024-08-16 accepted - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - ISO/IEC 24027:2021 - - - + + - - + - + + - Something that acts as or causes System Failure 2024-08-16 - System Failure - + Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + Brute Force Authorisations + 2022-08-17 Harshvardhan J. Pandit - Here system refers to both hardware and software systems + + accepted - - 2022-08-17 - + - - - Something that acts as or causes Loss of Customer Confidence + + + + + 2024-05-19 + Harshvardhan J. Pandit accepted - + + Monitor Consequence + Control that monitors a Risk Consequence + + + + Concept representing Social Disadvantage + 2022-08-19 + + + - - - Lose of Customer Confidence - 2022-08-17 - 2024-08-16 - Harshvardhan J. Pandit + Georg P. Krog + Social Disadvantage + accepted - + 2024-08-16 + - + 2024-05-19 - Control that monitors another Control - Harshvardhan J. Pandit - Monitor Control + accepted + + + A register recording incidentes, their reports, notifications, and other related activities - - accepted - + Incident Register - - accepted - - + - + + + - Accidental Misuse - Accidental Misuse + Hostility or prejudice against individuals who are or are perceived to be homosexual + 2024-09-30 + Homophobia - - - accepted - - - + + + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + Harshvardhan J. Pandit + + - - 2022-08-17 - Something that acts as or causes Security Breach - Security Breach - Harshvardhan J. Pandit - 2024-08-16 - + accepted + Concept representing Unauthorised Data Modification - + 2024-08-16 + Unauthorised Data Modification + + 2022-08-17 + - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + accepted + Incident Handling Report + 2024-05-19 + - - + + accepted + - + + - - Security Attack + + 2024-08-16 + Unwanted Data Deletion + Concept representing Unwanted Data Deletion + 2022-08-17 + Harshvardhan J. Pandit + + + + Low Risk (RM5x5 S:4 L:1) + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + + + Harshvardhan J. Pandit + 0.16,xsd:decimal accepted - Something that acts as or causes an attack on security with the aim of undermining it - + + - - 2024-08-16 - - - + + + + + + Harshvardhan J. Pandit + Concept representing Terrorism + 2024-08-16 accepted - Georg P. Krog - Social Disadvantage - 2022-08-19 - Something that acts as or causes Social Disadvantage - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + Terrorism + 2022-08-17 + - - + - + + + Language Discrimination - Sexual Harassment + 2024-09-30 accepted - + Discrimination based on a person's language, often linked to national origin or ethnicity + - - - 2024-02-14 - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + 2024-09-30 + + + + - Vulnerability + Discrimination based on a person's religious beliefs or practices accepted + Religious Discrimination + - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + + 2022-08-17 + + + + + - Source of threat event, including both agent and non-agent sources - - 2024-02-14 - Threat Source + Harshvardhan J. Pandit accepted + 2024-08-16 + Concept representing Unauthorised System Modification + + Unauthorised System Modification + - - + - - + + + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Failure to meet or complete the fulfilment of rights accepted - Individual Health & Safety - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - + Rights Unfulfilled - - - - 0.16,xsd:decimal - Harshvardhan J. Pandit - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - Low Risk (RM5x5 S:2 L:2) - 2022-08-17 - + - - accepted - - - - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - 2024-05-19 - Incident Mitigation Measure + - - - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - + + + + + + 2024-08-16 + Lose of Negotiating Capacity + Concept representing Loss of Negotiating Capacity 2022-08-17 Harshvardhan J. Pandit accepted - Risk Matrix 3x3 - - + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + 2024-09-13 + ISO/IEC 24027:2021 - + + + + - 2024-05-19 - Harshvardhan J. Pandit - - Control that reduces the severity of an event - Reduce Severity + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + Data Processing Bias + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit accepted - - - - accepted + + + + Caste Discrimination + + + + - A report describing the suspicion of an incident in the past or occuring - 2024-05-19 - Incident Suspected Report - + 2024-09-30 + accepted + + Discrimination based on a person's caste, a form of social stratification found in some cultures + - + + 2022-08-17 + + + + - Incident where the integrity of information or system has been affected - - Integrity Incident - - 2024-05-19 + Harshvardhan J. Pandit accepted + + Concept representing Injury + Injury + 2024-08-16 + + - - Harshvardhan J. Pandit - 0.43,xsd:decimal + + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + accepted - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High 2022-08-17 - Very High Risk (RM7x7 S:3 L:7) + 0.86,xsd:decimal + Harshvardhan J. Pandit - - Incident Ongoing - + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + 2022-08-17 + - The incident is ongoing i.e. still active - 2024-02-14 Harshvardhan J. Pandit - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate accepted - - - - - - - - - - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - accepted - 2024-09-13 - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - ISO/IEC 24027:2021 - Data Bias - + Moderate Risk (RM7x7 S:2 L:6) + 0.24,xsd:decimal + - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + 0.11,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low 2022-08-17 - Harshvardhan J. Pandit + accepted - 0.31,xsd:decimal - Moderate Risk (RM7x7 S:5 L:3) - + Low Risk (RM3x3 S:1 L:1) + - + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + + Cryptojacking + - + + + - 0.86,xsd:decimal 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - Extremely High Risk (RM7x7 S:6 L:7) - Harshvardhan J. Pandit + + accepted - + 2024-08-16 + Concept representing Cryptojacking + - - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + - + + - Gender Discrimination 2024-09-30 - - Discrimination based on a person's gender identity or gender expression + Excellence Discrimination accepted - + + Favoritism towards individuals deemed more competent or superior, often at the expense of others + - - Harshvardhan J. Pandit + + 0.14,xsd:decimal + Harshvardhan J. Pandit + accepted + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + Low Risk (RM7x7 S:1 L:7) + 2022-08-17 + + + + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + High Risk (RM7x7 S:3 L:5) + 0.31,xsd:decimal + + + 2022-08-17 - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 0.20,xsd:decimal + Harshvardhan J. Pandit accepted - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - + - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - 2024-02-14 + - Harshvardhan J. Pandit + 2024-05-19 + Incident where the availability of information or system has been affected + accepted - Incident Suspected - + + + Availability Incident - + + ISO/IEC 24027:2021 - - + + accepted - 2024-09-30 - Transphobia - Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + 2024-09-13 + - - - Risk Concepts - Turtle serialiation + + + - - accepted - - - - 2024-05-19 - Monitor Risk - - Harshvardhan J. Pandit - Control that monitors a Risk - - - - Discrimination against individuals based on physical or mental disabilities - + + Actions or measures that prevent an individual or group from exercising their legal rights. + 2024-08-16 + + - - 2024-09-30 - Disability Discrimination - accepted - - - - Indicates a concept is relevant to 'Integrity' in CIA InfoSec model - Harshvardhan J. Pandit - 2024-09-29 + 2022-08-18 - - - accepted - This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact - Integrity Concept - + Georg P. Krog, Harshvardhan J. Pandit + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Rights Exercise Prevented + - - Control that monitors a Risk Consequence - 2024-05-19 - Harshvardhan J. Pandit - + + - + Harshvardhan J. Pandit + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High accepted - Monitor Consequence - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + + 0.67,xsd:decimal + High Risk (RM3x3 S:2 L:3) + 2022-08-17 + - + 2024-09-13 - + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + + + - - ISO/IEC 24027:2021 - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + Informativeness Bias - Data Processing Bias accepted - + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + - - accepted - - - Incident Identifier - - 2024-05-19 - Identifier associated with an incident - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - 2024-06-12 - ISO 31073:2022 Risk management vocabulary - - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - - - Risk Management + accepted - - - ISO/IEC 24027:2021 - - + + - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - 2024-09-13 - accepted - Selection Bias - + 2024-10-21 + The occurence or potential occurence of earthquakes + Earthquake + - - + + - + + accepted + Concept representing delayed processing of applications + Delayed Application Processing + 2024-10-21 + + + + + + + + 2024-02-14 + + accepted - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + is exploited by - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - - - + - + + + + - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity 2022-08-17 - 2024-08-16 - + Concept representing Distributed Denial of Service Attack (DDoS) + Harshvardhan J. Pandit + 2024-08-16 accepted - Financial Loss - + Distributed Denial of Service Attack (DDoS) + - + + + + + - - Extremely High Risk (RM7x7 S:6 L:6) + Stub + + accepted + Service Cost Increased + 2024-10-21 + + + + + + + + + Guides for Data Privacy Vocabulary + + accepted - 2022-08-17 - 0.73,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High Harshvardhan J. Pandit - + 0.24,xsd:decimal + + + + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Moderate Risk (RM5x5 S:3 L:2) + - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - accepted + + - + + + + - Control that monitors a Risk Source - Monitor Risk Source + 2024-08-16 + Concept representing Equipment Failure + Equipment Failure + + 2022-08-17 + Here equipment refers to physical equipment Harshvardhan J. Pandit - 2024-05-19 + accepted - + - + + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + 2022-08-17 - 2022-08-17 - High Risk (RM3x3 S:3 L:2) - 0.67,xsd:decimal - Harshvardhan J. Pandit accepted - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + 0.22,xsd:decimal + + Low Risk (RM3x3 S:2 L:1) - - - Harshvardhan J. Pandit - Moderate Risk (RM5x5 S:4 L:2) - accepted - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.43,xsd:decimal 2022-08-17 - 0.32,xsd:decimal - + Very High Risk (RM7x7 S:3 L:7) + Harshvardhan J. Pandit + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + + + + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + Incident Concluding Report + + accepted + 2024-05-19 + - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - + + Risks and consequences regarding legal compliance and its violation - - + + - 2024-08-16 - Harshvardhan J. Pandit + Legal Compliance Risk + accepted - Harm + + + + + + accepted - Something that acts as or causes Harm to humans - 2022-08-13 - This concept refers to the general abstract notion of harm - + 2024-05-19 + + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - https://www.iso.org/standard/75281.html + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ISO/IEC 27005:2018 + ENISA Threat Taxonomy 2016 - + ENISA Methodology for Sectoral Cybersecurity Assessments https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - + + 2024-02-14 + + + + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring + Harshvardhan J. Pandit + accepted + + - + + Integrity Incident - Assessment of risk involving its identification, analysis, and evaluation - 2024-02-14 - ISO 31073:2022 Risk management vocabulary + Incident where the integrity of information or system has been affected + 2024-05-19 + accepted - - Risk Assessment - + + + + + 0.60,xsd:decimal + Very High Risk (RM5x5 S:3 L:5) 2022-08-17 Harshvardhan J. Pandit - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + + + Harshvardhan J. Pandit + + + + - + accepted - 0.10,xsd:decimal - - - - Indicates the risk (subject) has the indicated risk source (object) - - 2024-02-14 + - + System Failure + Concept representing System Failure + 2024-08-16 + Here system refers to both hardware and software systems + 2022-08-17 + + + + Societal Risk Concept + + + + + + + accepted - - - has risk source - - + + Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + 2024-10-21 + Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure + - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + + + + Primer for Data Privacy Vocabulary + + - + + 2024-10-21 + Inability to Provide Health Care + + + + + + Stub + + accepted + + + - - - + + + - Something that acts as or causes Confidentiality Breach - Confidentiality Breach - 2022-08-17 - 2024-08-16 + Sexual Harassment - Harshvardhan J. Pandit accepted - - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 + - - + + accepted - High Risk (RM7x7 S:6 L:3) - 0.37,xsd:decimal - 2022-08-17 - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - - - - Cross-Border Incident - 2024-05-19 + + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + + + + - + Sexual Violence + Concept representing Sexual Violence + + 2022-08-17 + Harshvardhan J. Pandit + accepted - Incident involving cross-border or multiple jurisdictions + 2024-08-16 + - - Low Risk (RM7x7 S:7 L:1) - + + Examples for Data Privacy Vocabulary + + + + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + + https://www.iso.org/standard/72140.html + IEC 31010:2019 + + + - + Risk Mitigation Measure that uses controls to monitor events + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. Harshvardhan J. Pandit accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - 0.14,xsd:decimal - 2022-08-17 - - - - - 2024-02-14 - - - Indicates the threat (subject) exploits the indicated vulnerability (object) - accepted - - exploits vulnerability - - - + 2024-05-19 + Monitor Control + + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - 2024-05-19 - - accepted - Confidentiality Incident - Incident where the confidentiality of information or system has been affected + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + - + A report describing the detection of a Incident + + accepted + + 2024-05-19 + Incident Detection Report - - ISO/IEC 27005:2018 + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - 2024-05-19 - + + Confidentiality Incident + Incident where the confidentiality of information or system has been affected accepted - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + + 2024-05-19 - - accepted + + + + + - - Incident caused due to environmental factors outside human controls - 2024-05-19 + A consequence related to the provision of a service + accepted - Environmental Incident + 2024-10-21 + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + accepted + + 2024-05-19 + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + - - Low Risk (RM5x5 S:4 L:1) - + + + 0.40,xsd:decimal 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High Harshvardhan J. Pandit - - 0.16,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low accepted + + High Risk (RM5x5 S:5 L:2) - + + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + accepted - Control that monitors a Risk Impact + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + 0.99,xsd:decimal + Extremely High Likelihood + 2022-08-18 + - - Monitor Impact - 2024-05-19 - + Level where Likelihood is Extremely High Harshvardhan J. Pandit - - - - - - Risk Concepts - N3 serialiation - - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + - ENISA Threat Landscape for Ransomware Attacks 2022 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + - Harshvardhan J. Pandit + Level where Severity is Extremely Low accepted - 0.71,xsd:decimal - 2022-08-17 - - - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 + 0.01,xsd:decimal + 2022-08-18 + Extremely Low Severity + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - Examples for Data Privacy Vocabulary - - - - - - - + + + + + + + + + Concept representing Equipment Malfunction + Here equipment refers to physical equipment + Equipment Malfunction 2022-08-17 Harshvardhan J. Pandit + accepted - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + 2024-08-16 + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + accepted + - - 0.49,xsd:decimal - + 2024-02-14 + Source of threat event, including both agent and non-agent sources + Threat Source - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Reference Incident Classification Taxonomy 2018 - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - 2022-08-17 - - Harshvardhan J. Pandit - 0.71,xsd:decimal - Extremely High Risk (RM7x7 S:7 L:5) - accepted - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - - - - - Risk Concepts - HTML serialiation - - - - - https://www.iso.org/standard/75281.html + - ISO/IEC 27005:2018 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - - - - - Guides for Data Privacy Vocabulary + + + accepted + + 2024-05-19 + + + Incident Identifier + Identifier associated with an incident - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - ENISA Reference Incident Classification Taxonomy 2018 - - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 - + + ENISa Trust Services Security Incidents 2021 - https://www.iso.org/standard/72140.html - IEC 31010:2019 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + + ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment diff --git a/2.1-dev/risk/risk-owl.ttl b/2.1-dev/risk/risk-owl.ttl index 877d90a81..3b0d491e3 100644 --- a/2.1-dev/risk/risk-owl.ttl +++ b/2.1-dev/risk/risk-owl.ttl @@ -133,7 +133,7 @@ risk-owl:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:prefLabel "Accidental Misuse"@en . risk-owl:AgeDiscrimination a rdfs:Class, @@ -165,7 +165,7 @@ risk-owl:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:prefLabel "Authorisation Failure"@en . risk-owl:AvailabilityBreach a rdfs:Class, @@ -222,8 +222,9 @@ risk-owl:Benefit a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Compensation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes benefits"@en ; - skos:prefLabel "Benefit"@en . + skos:definition "Concept representing benefits - both material and immaterial"@en ; + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk-owl:Bias a rdfs:Class, owl:Class, @@ -235,7 +236,7 @@ risk-owl:Bias a rdfs:Class, dct:created "2024-09-13"^^xsd:date ; dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:prefLabel "Bias"@en . @@ -256,7 +257,7 @@ risk-owl:Blackmail a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:prefLabel "Blackmail"@en . risk-owl:BruteForceAuthorisations a rdfs:Class, @@ -275,7 +276,7 @@ risk-owl:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:prefLabel "Brute Force Authorisations"@en . risk-owl:CasteDiscrimination a rdfs:Class, @@ -329,7 +330,7 @@ risk-owl:Coercion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:prefLabel "Coercion"@en . risk-owl:CognitiveBias a rdfs:Class, @@ -372,7 +373,7 @@ risk-owl:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -386,7 +387,7 @@ risk-owl:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -408,7 +409,7 @@ risk-owl:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:prefLabel "Compromise Account"@en . risk-owl:CompromiseAccountCredentials a rdfs:Class, @@ -427,7 +428,7 @@ risk-owl:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:prefLabel "Compromise Account Credentials"@en . risk-owl:ConfidentialityBreach a rdfs:Class, @@ -446,7 +447,7 @@ risk-owl:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DataBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:prefLabel "Confidentiality Breach"@en . risk-owl:ConfidentialityConcept a rdfs:Class, @@ -532,9 +533,10 @@ risk-owl:CopyrightViolation a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:definition "Concept representing Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . risk-owl:CoverageBias a rdfs:Class, @@ -576,9 +578,22 @@ risk-owl:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:prefLabel "Cryptojacking"@en . +risk-owl:CustomerSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:prefLabel "Customer Support Limited"@en . + risk-owl:Damage a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -589,9 +604,9 @@ risk-owl:Damage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:definition "Concept representing Damage"@en ; skos:prefLabel "Damage"@en . risk-owl:DataAggregationBias a rdfs:Class, @@ -644,7 +659,7 @@ risk-owl:DataBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityBreach ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:prefLabel "Data Breach"@en . risk-owl:DataCorruption a rdfs:Class, @@ -663,7 +678,7 @@ risk-owl:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -682,6 +697,19 @@ risk-owl:DataProcessingBias a rdfs:Class, skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; skos:prefLabel "Data Processing Bias"@en . +risk-owl:DelayedApplicationProcessing a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:prefLabel "Delayed Application Processing"@en . + risk-owl:DeliberateIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -706,7 +734,7 @@ risk-owl:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:prefLabel "Denial of Service Attack (DoS)"@en . risk-owl:DetectionControl a rdfs:Class, @@ -723,14 +751,15 @@ risk-owl:Detriment a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, risk-owl:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:definition "Concept representing Detriment"@en ; skos:prefLabel "Detriment"@en . risk-owl:DirectDiscrimination a rdfs:Class, @@ -761,23 +790,31 @@ risk-owl:DisabilityDiscrimination a rdfs:Class, risk-owl:Discrimination a rdfs:Class, owl:Class, - dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk, risk-owl:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RiskConcept, - risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:prefLabel "Discrimination"@en . +risk-owl:DisproportionateEnergyConsumption a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk-owl:DistributedDenialServiceAttack a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -793,9 +830,22 @@ risk-owl:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:DenialServiceAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . +risk-owl:Earthquake a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:prefLabel "Earthquake"@en . + risk-owl:EnvironmentalIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -811,8 +861,9 @@ risk-owl:EnvironmentalRisk a rdfs:Class, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:prefLabel "Environmental Risk"@en . @@ -833,7 +884,7 @@ risk-owl:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -853,11 +904,11 @@ risk-owl:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk-owl:ErroneousSystemUse a rdfs:Class, +risk-owl:ErroneousUse a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -872,8 +923,8 @@ risk-owl:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; - skos:prefLabel "Erroneous System Use"@en . + skos:definition "Concept representing erroneous use (of something)"@en ; + skos:prefLabel "Erroneous Use"@en . risk-owl:EthnicDiscrimination a rdfs:Class, owl:Class, @@ -914,9 +965,9 @@ risk-owl:ExposureToHarmfulSpeech a rdfs:Class, schema:name "ENISA Reference Incident Classification Taxonomy 2018" ; schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:definition "Concept representing Harmful Speech"@en ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -925,7 +976,7 @@ risk-owl:ExternalSecurityThreat a rdfs:Class, dpv-owl:RiskConcept, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:prefLabel "External Security Threat"@en . @@ -946,7 +997,7 @@ risk-owl:Extorsion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:prefLabel "Extorsion"@en . risk-owl:ExtremelyHighLikelihood a rdfs:Class, @@ -1033,8 +1084,9 @@ risk-owl:FinancialImpact a rdfs:Class, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:prefLabel "Financial Impact"@en . @@ -1054,9 +1106,22 @@ risk-owl:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:FinancialImpact ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:prefLabel "Financial Loss"@en . +risk-owl:Floods a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:prefLabel "Floods"@en . + risk-owl:Fraud a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1073,7 +1138,7 @@ risk-owl:Fraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:prefLabel "Fraud"@en . risk-owl:GenderDiscrimination a rdfs:Class, @@ -1117,6 +1182,18 @@ risk-owl:GroupAttributionBias a rdfs:Class, skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; skos:prefLabel "Group Attribution Bias"@en . +risk-owl:GroupRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:prefLabel "Societal Risk"@en . + risk-owl:HaltSource a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -1151,7 +1228,7 @@ risk-owl:Harm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -1228,7 +1305,7 @@ risk-owl:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:prefLabel "Human Errors"@en . risk-owl:IdentificationControl a rdfs:Class, @@ -1257,7 +1334,7 @@ risk-owl:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:prefLabel "Identity Fraud"@en . risk-owl:IdentityTheft a rdfs:Class, @@ -1276,9 +1353,22 @@ risk-owl:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:prefLabel "Identity Theft"@en . +risk-owl:IdentityVerificationFailure a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:prefLabel "Identity Verification Failure"@en . + risk-owl:IllegalDataProcessing a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1291,9 +1381,9 @@ risk-owl:IllegalDataProcessing a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1338,6 +1428,84 @@ risk-owl:InGroupBias a rdfs:Class, skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; skos:prefLabel "In-Group Bias"@en . +risk-owl:InabilityToEnterIntoContract a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk-owl:InabilityToEstablishLegalClaims a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk-owl:InabilityToFulfillLegalObligations a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk-owl:InabilityToProcessPayments a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Process Payments"@en . + +risk-owl:InabilityToProtectVitalInterests a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk-owl:InabilityToProvideHealthCare a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1598,10 +1766,12 @@ risk-owl:IndividualHealthSafety a rdfs:Class, risk-owl:IndividualRisk a rdfs:Class, owl:Class, + dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . @@ -1636,7 +1806,7 @@ risk-owl:Injury a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:prefLabel "Injury"@en . risk-owl:IntegrityBreach a rdfs:Class, @@ -1679,7 +1849,7 @@ risk-owl:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Misuse ; sw:term_status "accepted"@en ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:prefLabel "Intentional Misuse"@en . risk-owl:InterceptCommunications a rdfs:Class, @@ -1698,7 +1868,7 @@ risk-owl:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1739,16 +1909,56 @@ risk-owl:LanguageDiscrimination a rdfs:Class, skos:definition "Discrimination based on a person's language, often linked to national origin or ethnicity"@en ; skos:prefLabel "Language Discrimination"@en . -risk-owl:LegalRisk a rdfs:Class, +risk-owl:LegalComplianceRisk a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk-owl:LegalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; - skos:prefLabel "Legal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk-owl:LegalSupportLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Legal Support Limited"@en . + +risk-owl:LegallyRelevantConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:prefLabel "Legally Relevant Consequence"@en . risk-owl:LoseCredibility a rdfs:Class, owl:Class, @@ -1765,7 +1975,7 @@ risk-owl:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:prefLabel "Lose of Credibility"@en . risk-owl:LoseCustomerConfidence a rdfs:Class, @@ -1783,7 +1993,7 @@ risk-owl:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:prefLabel "Lose of Customer Confidence"@en . risk-owl:LoseGoodwill a rdfs:Class, @@ -1801,7 +2011,7 @@ risk-owl:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:prefLabel "Lose of Goodwill"@en . risk-owl:LoseNegotiatingCapacity a rdfs:Class, @@ -1819,7 +2029,7 @@ risk-owl:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:prefLabel "Lose of Negotiating Capacity"@en . risk-owl:LoseOpportunity a rdfs:Class, @@ -1837,7 +2047,7 @@ risk-owl:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:prefLabel "Lose of Opportunity"@en . risk-owl:LoseReputation a rdfs:Class, @@ -1855,7 +2065,7 @@ risk-owl:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:prefLabel "Lose of Reputation"@en . risk-owl:LoseTrust a rdfs:Class, @@ -1873,7 +2083,7 @@ risk-owl:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ReputationalRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:prefLabel "Lose of Trust"@en . risk-owl:LowLikelihood a rdfs:Class, @@ -1921,6 +2131,19 @@ risk-owl:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk-owl:LoyaltyProgramExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk-owl:MaliciousActivity a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -1950,7 +2173,7 @@ risk-owl:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:prefLabel "Malicious Code Attack"@en . risk-owl:MalwareAttack a rdfs:Class, @@ -1970,7 +2193,7 @@ risk-owl:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:prefLabel "Malware Attack"@en . risk-owl:MaterialDamage a rdfs:Class, @@ -1983,9 +2206,9 @@ risk-owl:MaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:definition "Concept representing Material Damage"@en ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2027,7 +2250,7 @@ risk-owl:Misuse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UserRisks ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:prefLabel "Misuse"@en . risk-owl:ModerateLikelihood a rdfs:Class, @@ -2176,9 +2399,9 @@ risk-owl:NonMaterialDamage a rdfs:Class, dct:created "2022-03-30"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegallyRelevantConsequence ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2218,11 +2441,26 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:TechnicalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OrganisationalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk-owl:OutGroupHomogeneityBias a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -2266,11 +2504,37 @@ risk-owl:PersonalSafetyEndangerment a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:IndividualRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:prefLabel "Personal Safety Endangerment"@en . +risk-owl:PersonalisationDisabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Disabled"@en . + +risk-owl:PersonalisationEnabled a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Personalisation Enabled"@en . + risk-owl:PhishingScam a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -2287,7 +2551,7 @@ risk-owl:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:prefLabel "Phishing Scam"@en . risk-owl:PhysicalAssault a rdfs:Class, @@ -2305,7 +2569,7 @@ risk-owl:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:prefLabel "Physical Assault"@en . risk-owl:PhysicalHarm a rdfs:Class, @@ -2319,6 +2583,17 @@ risk-owl:PhysicalHarm a rdfs:Class, sw:term_status "accepted"@en ; skos:prefLabel "Physical Harm"@en . +risk-owl:PolicyRisk a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:LegalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:prefLabel "Policy Risk"@en . + risk-owl:PotentialConsequence a rdfs:Class, owl:Class ; dct:contributor "Harshvardhan J. Pandit" ; @@ -2389,7 +2664,7 @@ risk-owl:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:prefLabel "Psychological Harm"@en . risk-owl:PublicOrderBreach a rdfs:Class, @@ -2404,11 +2679,24 @@ risk-owl:PublicOrderBreach a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:LegalRisk ; + rdfs:subClassOf risk-owl:LegalComplianceRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:definition "Concept representing Public Order Breach"@en ; skos:prefLabel "Public Order Breach"@en . +risk-owl:PublicServicesExclusion a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Public Services Exclusion"@en . + risk-owl:RM3x3S1L1 a rdfs:Class, owl:Class, risk-owl:RiskAnalysis ; @@ -3486,7 +3774,7 @@ risk-owl:Reidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -3568,7 +3856,7 @@ risk-owl:ReputationalRisk a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . @@ -3617,20 +3905,7 @@ risk-owl:Reward a rdfs:Class, skos:definition "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee"@en ; skos:prefLabel "Reward"@en . -risk-owl:RightEroded a rdfs:Class, - owl:Class, - dpv-owl:RiskConcept, - risk-owl:PotentialConsequence, - risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; - rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:RightsImpact ; - sw:term_status "accepted"@en ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk-owl:RightObstructed a rdfs:Class, +risk-owl:RightsDenied a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3639,11 +3914,11 @@ risk-owl:RightObstructed a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsDenial a rdfs:Class, +risk-owl:RightsEroded a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3652,11 +3927,11 @@ risk-owl:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsExercisePrevention a rdfs:Class, +risk-owl:RightsExercisePrevented a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3669,7 +3944,7 @@ risk-owl:RightsExercisePrevention a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RightsImpact a rdfs:Class, @@ -3685,13 +3960,13 @@ risk-owl:RightsImpact a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:SocietalRiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; - skos:prefLabel "Impact to Rights"@en ; + skos:definition "Concept representing Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsLimitation a rdfs:Class, +risk-owl:RightsLimited a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3704,9 +3979,22 @@ risk-owl:RightsLimitation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk-owl:RightsObstructed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RightsImpact ; + sw:term_status "accepted"@en ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk-owl:RightsUnfulfilled a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -3717,10 +4005,10 @@ risk-owl:RightsUnfulfilled a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk-owl:RightsViolation a rdfs:Class, +risk-owl:RightsViolated a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, @@ -3733,7 +4021,7 @@ risk-owl:RightsViolation a rdfs:Class, rdfs:subClassOf risk-owl:RightsImpact ; sw:term_status "accepted"@en ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk-owl:RiskAnalysis a rdfs:Class, @@ -3869,7 +4157,7 @@ risk-owl:Sabotage a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:prefLabel "Sabotage"@en . risk-owl:SamplingBias a rdfs:Class, @@ -3903,7 +4191,7 @@ risk-owl:Scam a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:prefLabel "Scam"@en . risk-owl:SecurityAttack a rdfs:Class, @@ -3917,7 +4205,7 @@ risk-owl:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:prefLabel "Security Attack"@en . risk-owl:SecurityBreach a rdfs:Class, @@ -3938,7 +4226,7 @@ risk-owl:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:prefLabel "Security Breach"@en . risk-owl:SelectionBias a rdfs:Class, @@ -3956,6 +4244,161 @@ risk-owl:SelectionBias a rdfs:Class, skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; skos:prefLabel "Selection Bias"@en . +risk-owl:ServiceAlternativeOffered a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Alternative Offered"@en . + +risk-owl:ServiceCostIncreased a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Cost Increased"@en . + +risk-owl:ServiceDenied a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Denied"@en . + +risk-owl:ServiceLimited a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Limited"@en . + +risk-owl:ServiceNotProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Not Provided"@en . + +risk-owl:ServicePartiallyProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Partially Provided"@en . + +risk-owl:ServiceProvided a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provided"@en . + +risk-owl:ServiceProvisionDelayed a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Provision Delayed"@en . + +risk-owl:ServiceQualityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Quality Reduced"@en . + +risk-owl:ServiceRelatedConsequence a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "A consequence related to the provision of a service"@en . + +risk-owl:ServiceSecurityReduced a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Security Reduced"@en . + +risk-owl:ServiceTermination a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:ServiceRelatedConsequence ; + sw:term_status "accepted"@en ; + skos:definition "Stub"@en ; + skos:prefLabel "Service Termination"@en . + risk-owl:SexDiscrimination a rdfs:Class, owl:Class, risk-owl:PotentialConsequence, @@ -4021,7 +4464,7 @@ risk-owl:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:prefLabel "Sexual Violence"@en . risk-owl:ShareRisk a rdfs:Class, @@ -4060,9 +4503,9 @@ risk-owl:SocialDisadvantage a rdfs:Class, dct:created "2022-08-19"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . risk-owl:SocietalBias a rdfs:Class, @@ -4087,21 +4530,24 @@ risk-owl:SocietalHealthSafety a rdfs:Class, risk-owl:PotentialImpact, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; skos:prefLabel "Societal Health & Safety"@en . -risk-owl:SocietalRisk a rdfs:Class, +risk-owl:SocietalRiskConcept a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialImpact, - risk-owl:PotentialRisk ; + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf dpv-owl:RiskConcept ; sw:term_status "accepted"@en ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; - skos:prefLabel "Societal Risk"@en . + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk-owl:SourceControl a rdfs:Class, owl:Class, @@ -4131,7 +4577,7 @@ risk-owl:Spoofing a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:MaliciousActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:prefLabel "Spoofing"@en . risk-owl:StatisticalBias a rdfs:Class, @@ -4165,7 +4611,7 @@ risk-owl:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -4186,7 +4632,7 @@ risk-owl:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:SecurityAttack ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:prefLabel "System Intrusion"@en . risk-owl:SystemMalfunction a rdfs:Class, @@ -4205,10 +4651,25 @@ risk-owl:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:OperationalSecurityRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk-owl:TechnicalRiskConcept a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialImpact, + risk-owl:PotentialRisk, + risk-owl:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf dpv-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk-owl:Terrorism a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -4222,9 +4683,9 @@ risk-owl:Terrorism a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:SocietalRisk ; + rdfs:subClassOf risk-owl:GroupRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:definition "Concept representing Terrorism"@en ; skos:prefLabel "Terrorism"@en . risk-owl:Threat a rdfs:Class, @@ -4276,7 +4737,7 @@ risk-owl:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:prefLabel "Unauthorised Access to Premises"@en . risk-owl:UnauthorisedActivity a rdfs:Class, @@ -4291,7 +4752,7 @@ risk-owl:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:ExternalSecurityThreat ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:prefLabel "Unauthorised Activity"@en . risk-owl:UnauthorisedCodeAccess a rdfs:Class, @@ -4311,7 +4772,7 @@ risk-owl:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:prefLabel "Unauthorised Code Access"@en . risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, @@ -4330,7 +4791,7 @@ risk-owl:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:prefLabel "Unauthorised Code Disclosure"@en . risk-owl:UnauthorisedCodeModification a rdfs:Class, @@ -4349,7 +4810,7 @@ risk-owl:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:prefLabel "Unauthorised Code Modification"@en . risk-owl:UnauthorisedDataAccess a rdfs:Class, @@ -4368,7 +4829,7 @@ risk-owl:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:prefLabel "Unauthorised Data Access"@en . risk-owl:UnauthorisedDataDisclosure a rdfs:Class, @@ -4387,7 +4848,7 @@ risk-owl:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:prefLabel "Unauthorised Data Disclosure"@en . risk-owl:UnauthorisedDataModification a rdfs:Class, @@ -4406,7 +4867,7 @@ risk-owl:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:prefLabel "Unauthorised Data Modification"@en . risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, @@ -4425,7 +4886,7 @@ risk-owl:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:prefLabel "Unauthorised Information Disclosure"@en . risk-owl:UnauthorisedReidentification a rdfs:Class, @@ -4441,7 +4902,7 @@ risk-owl:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:prefLabel "Unauthorised Re-Identification"@en . risk-owl:UnauthorisedResourceUse a rdfs:Class, @@ -4460,7 +4921,7 @@ risk-owl:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:prefLabel "Unauthorised Resource Use"@en . risk-owl:UnauthorisedSystemAccess a rdfs:Class, @@ -4480,7 +4941,7 @@ risk-owl:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:prefLabel "Unauthorised System Access"@en . risk-owl:UnauthorisedSystemModification a rdfs:Class, @@ -4499,7 +4960,7 @@ risk-owl:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:prefLabel "Unauthorised System Modification"@en . risk-owl:UnwantedCodeDeletion a rdfs:Class, @@ -4519,7 +4980,7 @@ risk-owl:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:prefLabel "Unwanted Code Deletion"@en . risk-owl:UnwantedDataDeletion a rdfs:Class, @@ -4539,7 +5000,7 @@ risk-owl:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:prefLabel "Unwanted Data Deletion"@en . risk-owl:UnwantedDisclosureData a rdfs:Class, @@ -4558,7 +5019,7 @@ risk-owl:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:UnauthorisedActivity ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:prefLabel "Unwanted Disclosure of Data"@en . risk-owl:UserRisks a rdfs:Class, @@ -4567,7 +5028,7 @@ risk-owl:UserRisks a rdfs:Class, risk-owl:PotentialRisk, risk-owl:PotentialRiskSource ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf dpv-owl:RiskConcept ; + rdfs:subClassOf risk-owl:OrganisationalRiskConcept ; sw:term_status "accepted"@en ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:prefLabel "User Risks"@en . @@ -4668,9 +5129,9 @@ risk-owl:ViolatingCodeOfConduct a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -4686,10 +5147,11 @@ risk-owl:ViolatingContractualObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk-owl:ViolatingEthicsCode a rdfs:Class, @@ -4704,9 +5166,9 @@ risk-owl:ViolatingEthicsCode a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -4722,23 +5184,48 @@ risk-owl:ViolatingLegalObligation a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk-owl:ViolatingObligation a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Obligation"@en . + risk-owl:ViolatingPolicy a rdfs:Class, owl:Class, dpv-owl:RiskConcept, risk-owl:PotentialConsequence, risk-owl:PotentialRisk ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:PolicyRisk ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:prefLabel "Violating Policy"@en . +risk-owl:ViolatingProhibition a rdfs:Class, + owl:Class, + dpv-owl:RiskConcept, + risk-owl:PotentialConsequence, + risk-owl:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:PolicyRisk ; + sw:term_status "accepted"@en ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:prefLabel "Violating Prohibition"@en . + risk-owl:ViolatingStatutoryObligations a rdfs:Class, owl:Class, dpv-owl:RiskConcept, @@ -4751,10 +5238,11 @@ risk-owl:ViolatingStatutoryObligations a rdfs:Class, schema:name "ISO/IEC 27005:2018" ; schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk-owl: ; - rdfs:subClassOf risk-owl:ViolatingObligation ; + rdfs:subClassOf risk-owl:LegalComplianceRisk, + risk-owl:ViolatingObligation ; sw:term_status "modified"@en ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk-owl:ViolenceAgainstChildren a rdfs:Class, @@ -4772,7 +5260,7 @@ risk-owl:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk-owl: ; rdfs:subClassOf risk-owl:Harm ; sw:term_status "accepted"@en ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/risk.csv b/2.1-dev/risk/risk.csv index 93d4bc508..8a5d8eade 100644 --- a/2.1-dev/risk/risk.csv +++ b/2.1-dev/risk/risk.csv @@ -9,88 +9,101 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,m 7RiskLevels,class,https://w3id.org/dpv/risk#7RiskLevels,7 Risk Levels,Scale with 7 Risk Levels from Extremely High to Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv#RiskLevel,,2022-08-18,,risk,https://w3id.org/dpv/risk 7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk -AgeDiscrimination,class,https://w3id.org/dpv/risk#AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Concept representing accidental misuse (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +AgeDiscrimination,class,https://w3id.org/dpv/risk#AgeDiscrimination,Age Discrimination,"Discrimination based on a person's age, often impacting older or younger individuals",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Concept representing Authorisation Failure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk AvailabilityConcept,class,https://w3id.org/dpv/risk#AvailabilityConcept,Availability Concept,Indicates a concept is relevant to 'Availability' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Compensation,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CasteDiscrimination,class,https://w3id.org/dpv/risk#CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Concept representing benefits - both material and immaterial,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Compensation,"Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal",2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#TechnicalRiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Concept representing Blackmail,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CasteDiscrimination,class,https://w3id.org/dpv/risk#CasteDiscrimination,Caste Discrimination,"Discrimination based on a person's caste, a form of social stratification found in some cultures",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Concept representing Coercion,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Concept representing Component Failure,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Concept representing Component Malfunction,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Concept representing a compromised account that is then used by the compromiser,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Concept representing Account Credentials to be compromised,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Concept representing Confidentiality Breach,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ConfidentialityConcept,class,https://w3id.org/dpv/risk#ConfidentialityConcept,Confidentiality Concept,Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Concept representing Copyright Violation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Concept representing Cryptojacking,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CustomerSupportLimited,class,https://w3id.org/dpv/risk#CustomerSupportLimited,Customer Support Limited,Concept representing customer support to be limited,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Concept representing Damage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Concept representing Data Breach,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Concept representing Corruption of Data,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DelayedApplicationProcessing,class,https://w3id.org/dpv/risk#DelayedApplicationProcessing,Delayed Application Processing,Concept representing delayed processing of applications,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Concept representing Denial of Service Attack (DoS),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -DirectDiscrimination,class,https://w3id.org/dpv/risk#DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -DisabilityDiscrimination,class,https://w3id.org/dpv/risk#DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DenialServiceAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Concept representing Detriment,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk +DirectDiscrimination,class,https://w3id.org/dpv/risk#DirectDiscrimination,Direct Discrimination,"Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +DisabilityDiscrimination,class,https://w3id.org/dpv/risk#DisabilityDiscrimination,Disability Discrimination,Discrimination against individuals based on physical or mental disabilities,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,"Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,2024-09-30,,risk,https://w3id.org/dpv/risk +DisproportionateEnergyConsumption,class,https://w3id.org/dpv/risk#DisproportionateEnergyConsumption,Disproportionate Energy Consumption,The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv#RiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Concept representing Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#DenialServiceAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Earthquake,class,https://w3id.org/dpv/risk#Earthquake,Earthquake,The occurence or potential occurence of earthquakes,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv#RiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EthnicDiscrimination,class,https://w3id.org/dpv/risk#EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk -ExcellenceDiscrimination,class,https://w3id.org/dpv/risk#ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Concept representing Equipment Failure,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Concept representing Equipment Malfunction,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ErroneousUse,class,https://w3id.org/dpv/risk#ErroneousUse,Erroneous Use,Concept representing erroneous use (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EthnicDiscrimination,class,https://w3id.org/dpv/risk#EthnicDiscrimination,Ethnic Discrimination,Discrimination against individuals based on their ethnicity or cultural heritage,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExcellenceDiscrimination,class,https://w3id.org/dpv/risk#ExcellenceDiscrimination,Excellence Discrimination,"Favoritism towards individuals deemed more competent or superior, often at the expense of others",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Concept representing Harmful Speech,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#TechnicalRiskConcept,,,,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Concept representing Extorsion,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyLowLikelihood,class,https://w3id.org/dpv/risk#ExtremelyLowLikelihood,Extremely Low Likelihood,Level where Likelihood is Extremely Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyLowRisk,class,https://w3id.org/dpv/risk#ExtremelyLowRisk,Extremely Low Risk,Level where Risk is Extremely Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extremely Low Severity,Level where Severity is Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -GenderDiscrimination,class,https://w3id.org/dpv/risk#GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -GeographicDiscrimination,class,https://w3id.org/dpv/risk#GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#OrganisationalRiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Floods,class,https://w3id.org/dpv/risk#Floods,Floods,The occurence or potential occurence of floods,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv#RiskConcept,,2024-10-21,,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Concept representing Fraud,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +GenderDiscrimination,class,https://w3id.org/dpv/risk#GenderDiscrimination,Gender Discrimination,Discrimination based on a person's gender identity or gender expression,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +GeographicDiscrimination,class,https://w3id.org/dpv/risk#GeographicDiscrimination,Geographic Discrimination,Discrimination based on a person's geographical origin or residence,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +GroupRisk,class,https://w3id.org/dpv/risk#GroupRisk,Societal Risk,Risks and issues that affect or have the potential to affect groups in society,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,,,risk,https://w3id.org/dpv/risk HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Harassment,class,https://w3id.org/dpv/risk#Harassment,Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk -Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk -HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +Harassment,class,https://w3id.org/dpv/risk#Harassment,Harassment,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Concept representing Harm to humans,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk +HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -Homophobia,class,https://w3id.org/dpv/risk#Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +Homophobia,class,https://w3id.org/dpv/risk#Homophobia,Homophobia,Hostility or prejudice against individuals who are or are perceived to be homosexual,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Concept representing Identity Fraud,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Concept representing Identity Theft,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityVerificationFailure,class,https://w3id.org/dpv/risk#IdentityVerificationFailure,Identity Verification Failure,Concept representing failure to verify identity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Concept representing Illegal Processing of Data,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InabilityToEnterIntoContract,class,https://w3id.org/dpv/risk#InabilityToEnterIntoContract,Inability to Enter Into Contract,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToEstablishLegalClaims,class,https://w3id.org/dpv/risk#InabilityToEstablishLegalClaims,Inability to Establish Legal Claims,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToFulfillLegalObligations,class,https://w3id.org/dpv/risk#InabilityToFulfillLegalObligations,Inability to Fulfill Legal Obligations,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToProcessPayments,class,https://w3id.org/dpv/risk#InabilityToProcessPayments,Inability to Process Payments,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToProtectVitalInterests,class,https://w3id.org/dpv/risk#InabilityToProtectVitalInterests,Inability to Protect Vital Interests,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +InabilityToProvideHealthCare,class,https://w3id.org/dpv/risk#InabilityToProvideHealthCare,Inability to Provide Health Care,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk @@ -114,39 +127,43 @@ IncidentStatusUnknown,class,https://w3id.org/dpv/risk#IncidentStatusUnknown,Inci IncidentSuspected,class,https://w3id.org/dpv/risk#IncidentSuspected,Incident Suspected,"The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing",https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport,Incident Suspected Report,A report describing the suspicion of an incident in the past or occuring,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk -IndirectDiscrimination,class,https://w3id.org/dpv/risk#IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,,,,,risk,https://w3id.org/dpv/risk -InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IndirectDiscrimination,class,https://w3id.org/dpv/risk#IndirectDiscrimination,Indirect Discrimination,"Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,,,,risk,https://w3id.org/dpv/risk +InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Concept representing Injury,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IntegrityConcept,class,https://w3id.org/dpv/risk#IntegrityConcept,Integrity Concept,Indicates a concept is relevant to 'Integrity' in CIA InfoSec model,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,"This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact",2024-09-29,,risk,https://w3id.org/dpv/risk IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk -JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk -LanguageDiscrimination,class,https://w3id.org/dpv/risk#LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Something that acts as or causes Loss of Credibility,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Something that acts as or causes Loss of Customer Confidence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Something that acts as or causes Loss of Goodwill,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Something that acts as or causes Loss of Negotiating Capacity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Concept represent an intentional misuse (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Misuse,,,,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Concept representing Interception of Communications,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialLoss,,,,risk,https://w3id.org/dpv/risk +LanguageDiscrimination,class,https://w3id.org/dpv/risk#LanguageDiscrimination,Language Discrimination,"Discrimination based on a person's language, often linked to national origin or ethnicity",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +LegalComplianceRisk,class,https://w3id.org/dpv/risk#LegalComplianceRisk,Legal Compliance Risk,Risks and consequences regarding legal compliance and its violation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalRiskConcept,,,,risk,https://w3id.org/dpv/risk +LegalRiskConcept,class,https://w3id.org/dpv/risk#LegalRiskConcept,Legal Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation,2024-10-21,,risk,https://w3id.org/dpv/risk +LegalSupportLimited,class,https://w3id.org/dpv/risk#LegalSupportLimited,Legal Support Limited,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +LegallyRelevantConsequence,class,https://w3id.org/dpv/risk#LegallyRelevantConsequence,Legally Relevant Consequence,A consequence that is legally relevant i.e. actionable under law,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalRiskConcept,,,,risk,https://w3id.org/dpv/risk +LoseCredibility,class,https://w3id.org/dpv/risk#LoseCredibility,Lose of Credibility,Concept representing Loss of Credibility,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseCustomerConfidence,class,https://w3id.org/dpv/risk#LoseCustomerConfidence,Lose of Customer Confidence,Concept representing Loss of Customer Confidence,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseGoodwill,class,https://w3id.org/dpv/risk#LoseGoodwill,Lose of Goodwill,Concept representing Loss of Goodwill,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity,Lose of Negotiating Capacity,Concept representing Loss of Negotiating Capacity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Concept representing Loss of Opportunity,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Concept representing Loss of Reputation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Concept representing Loss of Trust,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MaliciousActivity,class,https://w3id.org/dpv/risk#MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -Misandry,class,https://w3id.org/dpv/risk#Misandry,Misandry,"Dislike, contempt, or prejudice against men",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Misogyny,class,https://w3id.org/dpv/risk#Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk -ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LoyaltyProgramExclusion,class,https://w3id.org/dpv/risk#LoyaltyProgramExclusion,Loyalty Program Exclusion,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +MaliciousActivity,class,https://w3id.org/dpv/risk#MaliciousActivity,Malicious Activity,"Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Concept representing Malicious Code Attack,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Concept representing Malware Attack,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Concept representing Material Damage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +Misandry,class,https://w3id.org/dpv/risk#Misandry,Misandry,"Dislike, contempt, or prejudice against men",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misogyny,class,https://w3id.org/dpv/risk#Misogyny,Misogyny,"Dislike, contempt, or prejudice against women",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Concept representing a misuse (of something),https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk +ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk MonitorImpact,class,https://w3id.org/dpv/risk#MonitorImpact,Monitor Impact,Control that monitors a Risk Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -154,24 +171,29 @@ MonitorRisk,class,https://w3id.org/dpv/risk#MonitorRisk,Monitor Risk,Control tha MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Control,Control that monitors another Control,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -NationalityDiscrimination,class,https://w3id.org/dpv/risk#NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +NationalityDiscrimination,class,https://w3id.org/dpv/risk#NationalityDiscrimination,Nationality Discrimination,Discrimination based on a person's nationality or citizenship,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Concept representing Non-Material Damage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegallyRelevantConsequence,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#TechnicalRiskConcept,,,,risk,https://w3id.org/dpv/risk +OrganisationalRiskConcept,class,https://w3id.org/dpv/risk#OrganisationalRiskConcept,Organisational Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,Organisational in this context refers to an organisation which is not human but is managed by humans,2024-10-21,,risk,https://w3id.org/dpv/risk +OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Concept representing Personal Safety Endangerment,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PersonalisationDisabled,class,https://w3id.org/dpv/risk#PersonalisationDisabled,Personalisation Disabled,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +PersonalisationEnabled,class,https://w3id.org/dpv/risk#PersonalisationEnabled,Personalisation Enabled,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Concept representing Phishing Scam,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Concept representing Physical Assault,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +PolicyRisk,class,https://w3id.org/dpv/risk#PolicyRisk,Policy Risk,Risks and consequences regarding policy and its associated processes,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalRiskConcept,,,,risk,https://w3id.org/dpv/risk PotentialConsequence,class,https://w3id.org/dpv/risk#PotentialConsequence,Potential Consequence,Indicates a concept can potentially be a 'consequence concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk PotentialImpact,class,https://w3id.org/dpv/risk#PotentialImpact,Potential Impact,Indicates a concept can potentially be a 'impact' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk PotentialRisk,class,https://w3id.org/dpv/risk#PotentialRisk,Potential Risk,Indicates a concept can potentially be a 'risk' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk PotentialRiskSource,class,https://w3id.org/dpv/risk#PotentialRiskSource,Potential RiskSource,Indicates a concept can potentially be a 'risk source' concept within an use-case,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case,2024-09-29,,risk,https://w3id.org/dpv/risk -Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk -PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Something that acts as or causes Psychological Harm,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Something that acts as or causes Public Order Breach,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk +PsychologicalHarm,class,https://w3id.org/dpv/risk#PsychologicalHarm,Psychological Harm,Concept representing Psychological Harm,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicOrderBreach,class,https://w3id.org/dpv/risk#PublicOrderBreach,Public Order Breach,Concept representing Public Order Breach,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#LegalComplianceRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PublicServicesExclusion,class,https://w3id.org/dpv/risk#PublicServicesExclusion,Public Services Exclusion,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk RM3x3S1L1,class,https://w3id.org/dpv/risk#RM3x3S1L1,Low Risk (RM3x3 S:1 L:1),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk RM3x3S1L2,class,https://w3id.org/dpv/risk#RM3x3S1L2,Low Risk (RM3x3 S:1 L:2),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk RM3x3S1L3,class,https://w3id.org/dpv/risk#RM3x3S1L3,Moderate Risk (RM3x3 S:1 L:3),Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix3x3,,2022-08-17,,risk,https://w3id.org/dpv/risk @@ -255,31 +277,31 @@ RM7x7S7L4,class,https://w3id.org/dpv/risk#RM7x7S7L4,Very High Risk (RM7x7 S:7 L: RM7x7S7L5,class,https://w3id.org/dpv/risk#RM7x7S7L5,Extremely High Risk (RM7x7 S:7 L:5),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk RM7x7S7L6,class,https://w3id.org/dpv/risk#RM7x7S7L6,Extremely High Risk (RM7x7 S:7 L:6),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk RM7x7S7L7,class,https://w3id.org/dpv/risk#RM7x7S7L7,Extremely High Risk (RM7x7 S:7 L:7),Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High,https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix7x7,,2022-08-17,,risk,https://w3id.org/dpv/risk -RacialDiscrimination,class,https://w3id.org/dpv/risk#RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Racism,class,https://w3id.org/dpv/risk#Racism,Racism,Prejudice or discrimination against people based on their race,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +RacialDiscrimination,class,https://w3id.org/dpv/risk#RacialDiscrimination,Racial Discrimination,Discrimination against individuals because of their racial background or skin color,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Racism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Racism,class,https://w3id.org/dpv/risk#Racism,Racism,Prejudice or discrimination against people based on their race,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control,Control to recover from event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -ReligiousDiscrimination,class,https://w3id.org/dpv/risk#ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Concept representing Re-identification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +ReligiousDiscrimination,class,https://w3id.org/dpv/risk#ReligiousDiscrimination,Religious Discrimination,Discrimination based on a person's religious beliefs or practices,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk -ReverseDiscrimination,class,https://w3id.org/dpv/risk#ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -RightEroded,class,https://w3id.org/dpv/risk#RightEroded,Erosion of Rights,The gradual weakening or reduction of the scope and protection of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightObstructed,class,https://w3id.org/dpv/risk#RightObstructed,Obstruction of Rights,Interference with or blocking of the exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightsDenial,class,https://w3id.org/dpv/risk#RightsDenial,Denial of Rights,The refusal or withholding or denial of the existence or applicability of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Actions or measures that prevent an individual or group from exercising their legal rights.,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,A limitation or restrictions on the scope or exercise of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsUnfulfilled,class,https://w3id.org/dpv/risk#RightsUnfulfilled,Unfulfilment of Rights,Failure to meet or complete the fulfilment of rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk -RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#OrganisationalRiskConcept,,,,risk,https://w3id.org/dpv/risk +RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk +ReverseDiscrimination,class,https://w3id.org/dpv/risk#ReverseDiscrimination,Reverse Discrimination,"Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Renumeration,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk +RightsDenied,class,https://w3id.org/dpv/risk#RightsDenied,Rights Denied,The refusal or withholding or denial of the existence or applicability of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsEroded,class,https://w3id.org/dpv/risk#RightsEroded,Rights Eroded,The gradual weakening or reduction of the scope and protection of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsExercisePrevented,class,https://w3id.org/dpv/risk#RightsExercisePrevented,Rights Exercise Prevented,Actions or measures that prevent an individual or group from exercising their legal rights.,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Rights Impact,Concept representing Impact to Rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SocietalRiskConcept,"This concept was called ""ImpactToRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsLimited,class,https://w3id.org/dpv/risk#RightsLimited,Rights Limited,A limitation or restrictions on the scope or exercise of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""LimitationOfRights"" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk +RightsObstructed,class,https://w3id.org/dpv/risk#RightsObstructed,Rights Obstructed,Interference with or blocking of the exercise of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsUnfulfilled,class,https://w3id.org/dpv/risk#RightsUnfulfilled,Rights Unfulfilled,Failure to meet or complete the fulfilment of rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",,,risk,https://w3id.org/dpv/risk +RightsViolated,class,https://w3id.org/dpv/risk#RightsViolated,Rights Violated,The infringement or breach of rights in a manner that constitues a 'violation' of those rights,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#RightsImpact,"This concept was called ""ViolationOfRights"" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk RiskAssessment,class,https://w3id.org/dpv/risk#RiskAssessment,Risk Assessment,"Assessment of risk involving its identification, analysis, and evaluation",,https://w3id.org/dpv/risk#RiskManagement,https://w3id.org/dpv/risk#RiskManagement,,2024-02-14,,risk,https://w3id.org/dpv/risk RiskControl,class,https://w3id.org/dpv/risk#RiskControl,Risk Control,Control that modifies risk,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,,2024-05-19,,risk,https://w3id.org/dpv/risk @@ -289,64 +311,78 @@ RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A R RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk -RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SexDiscrimination,class,https://w3id.org/dpv/risk#SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -Sexism,class,https://w3id.org/dpv/risk#Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -SexualHarassment,class,https://w3id.org/dpv/risk#SexualHarassment,Sexual Harassment,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk -SexualOrientationDiscrimination,class,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk -SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Concept representing Sabotage,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Concept representing Scam,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Concept representing an attack on security with the aim of undermining it,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Concept representing Security Breach,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ServiceAlternativeOffered,class,https://w3id.org/dpv/risk#ServiceAlternativeOffered,Service Alternative Offered,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceCostIncreased,class,https://w3id.org/dpv/risk#ServiceCostIncreased,Service Cost Increased,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceDenied,class,https://w3id.org/dpv/risk#ServiceDenied,Service Denied,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceLimited,class,https://w3id.org/dpv/risk#ServiceLimited,Service Limited,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceNotProvided,class,https://w3id.org/dpv/risk#ServiceNotProvided,Service Not Provided,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServicePartiallyProvided,class,https://w3id.org/dpv/risk#ServicePartiallyProvided,Service Partially Provided,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceProvided,class,https://w3id.org/dpv/risk#ServiceProvided,Service Provided,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceProvisionDelayed,class,https://w3id.org/dpv/risk#ServiceProvisionDelayed,Service Provision Delayed,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceQualityReduced,class,https://w3id.org/dpv/risk#ServiceQualityReduced,Service Quality Reduced,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceSecurityReduced,class,https://w3id.org/dpv/risk#ServiceSecurityReduced,Service Security Reduced,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +ServiceTermination,class,https://w3id.org/dpv/risk#ServiceTermination,Service Termination,Stub,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ServiceRelatedConsequence,,2024-10-21,,risk,https://w3id.org/dpv/risk +SexDiscrimination,class,https://w3id.org/dpv/risk#SexDiscrimination,Sex Discrimination,Discrimination based on a person's biological sex,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +Sexism,class,https://w3id.org/dpv/risk#Sexism,Sexism,"Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualHarassment,class,https://w3id.org/dpv/risk#SexualHarassment,Sexual Harassment,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,,,risk,https://w3id.org/dpv/risk +SexualOrientationDiscrimination,class,https://w3id.org/dpv/risk#SexualOrientationDiscrimination,SexualOrientation Discrimination,"Discrimination based on a person's sexual orientation, typically against those who are not heterosexual",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Discrimination,,2024-09-30,,risk,https://w3id.org/dpv/risk +SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Concept representing Sexual Violence,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk -SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Concept representing Social Disadvantage,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#GroupRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#GroupRisk,,,,risk,https://w3id.org/dpv/risk +SocietalRiskConcept,class,https://w3id.org/dpv/risk#SocietalRiskConcept,Societal Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,"Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure",2024-10-21,,risk,https://w3id.org/dpv/risk SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Concept representing Spoofing,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#MaliciousActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Concept representing System Failure,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Concept representing System Intrusion,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SecurityAttack,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Concept representing System Malfunction,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +TechnicalRiskConcept,class,https://w3id.org/dpv/risk#TechnicalRiskConcept,Technical Risk Concept,"Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact,,https://w3id.org/dpv#RiskConcept,Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes,2024-10-21,,risk,https://w3id.org/dpv/risk +Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Concept representing Terrorism,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#GroupRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -Transphobia,class,https://w3id.org/dpv/risk#Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +Transphobia,class,https://w3id.org/dpv/risk#Transphobia,Transphobia,Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms,https://w3id.org/dpv/risk#RiskConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Sexism,,2024-09-30,,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Concept representing Unauthorised Access to Premises,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Concept representing Unauthorised Activity,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Concept representing Unauthorised Code Access,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Concept representing Unauthorised Code Disclosure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Concept representing Unauthorised Code Modification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Concept representing Unauthorised Data Access,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Concept representing Unauthorised Data Disclosure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Concept representing Unauthorised Data Modification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Concept representing Unauthorised Information Disclosure,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Concept representing Unauthorised Re-Identification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Concept representing Unauthorised Resource Use,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Concept representing Unauthorised System Access,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Concept representing Unauthorised System Modification,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Concept representing Unwanted Code Deletion,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Concept representing Unwanted Data Deletion,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Concept representing Unwanted Disclosure of Data,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRiskSource;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UnauthorisedActivity,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialRiskSource,,https://w3id.org/dpv/risk#OrganisationalRiskConcept,,,,risk,https://w3id.org/dpv/risk +VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#5SeverityLevels;https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violation of Contractual Obligation,Something that acts as or causes Violation of Contractual Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Something that acts as or causes Violation of Ethics Code,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violation of Legal Obligations,Something that acts as or causes Violation of Legal Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Something that acts as or causes violation of policy which can be either internal or external policy,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,,,,risk,https://w3id.org/dpv/risk -ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violation of Statutory Obligations,Something that acts as or causes Violation of Statutory Obligations,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ViolatingObligation,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Something that acts as or causes Child Violence,https://w3id.org/dpv/risk#PotentialConsequence;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#Harm,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Concept representing Violation of Code of Conduct,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingContractualObligation,class,https://w3id.org/dpv/risk#ViolatingContractualObligation,Violating Contractual Obligation,Concept representing Violation of Contractual Obligations,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""ViolationContractualObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingEthicsCode,class,https://w3id.org/dpv/risk#ViolatingEthicsCode,Violating Ethics Code,Concept representing Violation of Ethics Code,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,"This concept was called ""ViolationEthicalCode"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingLegalObligation,class,https://w3id.org/dpv/risk#ViolatingLegalObligation,Violating Legal Obligation,Concept representing Violation of Legal Obligations,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""ViolationRegulatoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolatingObligation,class,https://w3id.org/dpv/risk#ViolatingObligation,Violating Obligation,"Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,,2024-10-21,,risk,https://w3id.org/dpv/risk +ViolatingPolicy,class,https://w3id.org/dpv/risk#ViolatingPolicy,Violating Policy,Concept representing violation of policy which can be either internal or external policy,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,,,,risk,https://w3id.org/dpv/risk +ViolatingProhibition,class,https://w3id.org/dpv/risk#ViolatingProhibition,Violating Prohibition,"Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract",https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#PolicyRisk,,2024-10-21,,risk,https://w3id.org/dpv/risk +ViolatingStatutoryObligations,class,https://w3id.org/dpv/risk#ViolatingStatutoryObligations,Violating Statutory Obligations,Concept representing Violation of Statutory Obligations,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#ViolatingObligation;https://w3id.org/dpv/risk#LegalComplianceRisk,"This concept was called ""ViolationStatutoryObligations"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ViolenceAgainstChildren,class,https://w3id.org/dpv/risk#ViolenceAgainstChildren,Violence against children,Concept representing Child Violence,https://w3id.org/dpv/risk#PotentialRisk;https://w3id.org/dpv#RiskConcept;https://w3id.org/dpv/risk#PotentialImpact;https://w3id.org/dpv/risk#PotentialConsequence,,https://w3id.org/dpv/risk#Harm,"This concept was called ""ChildViolence"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Vulnerability,class,https://w3id.org/dpv/risk#Vulnerability,Vulnerability,Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk,,,,,2024-02-14,,risk,https://w3id.org/dpv/risk causedByThreat,property,https://w3id.org/dpv/risk#causedByThreat,caused by threat,Indicates the cause of associated context (subject) was the indicated threat (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk causedByVulnerability,property,https://w3id.org/dpv/risk#causedByVulnerability,caused by vulnerability,Indicates the associated context (subject) is caused by the indicated vulnerability (object),,,,,2024-02-14,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/risk.html b/2.1-dev/risk/risk.html index d082f005d..35ffb9e3b 100644 --- a/2.1-dev/risk/risk.html +++ b/2.1-dev/risk/risk.html @@ -13,7 +13,7 @@ title: "Risk Concepts (RISK)", subtitle: "version 2.1-dev", publishDate: "2024-08-18", - specStatus: "CG-FINAL", + specStatus: "CG-DRAFT", group: "dpvcg", latestVersion: "https://w3id.org/dpv/risk", canonicalUri: "https://w3id.org/dpv/risk", @@ -643,33 +643,42 @@

    Core Concepts

    -
    -
    -

    Likelihood, Severity, and Levels

    -

    To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

    -
      -
    • Likelihood: -
        -
      • [=3LikelihoodLevels=] which contains 3 likelihood levels of [=HighLikelihood=] (0.75), [=ModerateLikelihood=] (0.5), and [=LowLikelihood=] (0.25)
      • -
      • [=5LikelihoodLevels=] which contains the 3 likelihood levels from [=3LikelihoodLevels=] as well as [=VeryHighLikelihood=] (0.9) and [=VeryLowLikelihood=] (0.1)
      • -
      • [=7LikelihoodLevels=] which contains the 5 likelihood levels from [=5LikelihoodLevels=] as well as [=ExtremelyHighLikelihood=] (0.99) and [=ExtremelyLowLikelihood=] (0.01)
      • -
    • -
    • Severity: -
        -
      • [=3SeverityLevels=] which contains 3 Severity levels of [=HighSeverity=] (0.75), [=ModerateSeverity=] (0.5), and [=LowSeverity=] (0.25)
      • -
      • [=5SeverityLevels=] which contains the 3 Severity levels from [=3SeverityLevels=] as well as [=VeryHighSeverity=] (0.9) and [=VeryLowSeverity=] (0.1)
      • -
      • [=7SeverityLevels=] which contains the 5 Severity levels from [=5SeverityLevels=] as well as [=ExtremelyHighSeverity=] (0.99) and [=ExtremelyLowSeverity=] (0.01)
      • -
    • -
    • RiskLevel: -
        -
      • [=3RiskLevels=] which contains 3 RiskLevel levels of [=HighRisk=] (0.75), [=ModerateRisk=] (0.5), and [=LowRisk=] (0.25)
      • -
      • [=5RiskLevels=] which contains the 3 RiskLevel levels from [=3RiskLevels=] as well as [=VeryHighRisk=] (0.9) and [=VeryLowRisk=] (0.1)
      • -
      • [=7RiskLevels=] which contains the 5 RiskLevel levels from [=5RiskLevels=] as well as [=ExtremelyHighRisk=] (0.99) and [=ExtremelyLowRisk=] (0.01)
      • -
    • -
    +
    +

    Risk Management

    +

    lorem ipsum

    +
    + +
    +

    Risk Assessment

    +

    lorem ipsum

    +
    + +
    +

    Likelihood, Severity, and Levels

    +

    To express likelihoods, severities, and levels in a convenient manner, the RISK extension provides the following groups of concepts. Each concept is associated with a suggested value to represent the extent or degree of the concept between 0..1 using rdf:value e.g. [=ExtremelyLowRisk=] has a value of 0.01 and [=HighLikelihood=] has a value of 0.75. Each group uses these values to express a range within a group e.g. in [=3LikelihoodLevels=] the [=LowLikelihood=] (0.25) covers the range 0 to 0.25, while in [=7LikelihoodLevels=] it covers the range from 0.1 ([=VeryLowLikelihood=]) to 0.25. Adopters can thus choose the appropriate ranges, and as the values are suggestions - they can be changed to match the requirements of the use-case.

    +
      +
    • Likelihood: +
        +
      • [=3LikelihoodLevels=] which contains 3 likelihood levels of [=HighLikelihood=] (0.75), [=ModerateLikelihood=] (0.5), and [=LowLikelihood=] (0.25)
      • +
      • [=5LikelihoodLevels=] which contains the 3 likelihood levels from [=3LikelihoodLevels=] as well as [=VeryHighLikelihood=] (0.9) and [=VeryLowLikelihood=] (0.1)
      • +
      • [=7LikelihoodLevels=] which contains the 5 likelihood levels from [=5LikelihoodLevels=] as well as [=ExtremelyHighLikelihood=] (0.99) and [=ExtremelyLowLikelihood=] (0.01)
      • +
    • +
    • Severity: +
        +
      • [=3SeverityLevels=] which contains 3 Severity levels of [=HighSeverity=] (0.75), [=ModerateSeverity=] (0.5), and [=LowSeverity=] (0.25)
      • +
      • [=5SeverityLevels=] which contains the 3 Severity levels from [=3SeverityLevels=] as well as [=VeryHighSeverity=] (0.9) and [=VeryLowSeverity=] (0.1)
      • +
      • [=7SeverityLevels=] which contains the 5 Severity levels from [=5SeverityLevels=] as well as [=ExtremelyHighSeverity=] (0.99) and [=ExtremelyLowSeverity=] (0.01)
      • +
    • +
    • RiskLevel: +
        +
      • [=3RiskLevels=] which contains 3 RiskLevel levels of [=HighRisk=] (0.75), [=ModerateRisk=] (0.5), and [=LowRisk=] (0.25)
      • +
      • [=5RiskLevels=] which contains the 3 RiskLevel levels from [=3RiskLevels=] as well as [=VeryHighRisk=] (0.9) and [=VeryLowRisk=] (0.1)
      • +
      • [=7RiskLevels=] which contains the 5 RiskLevel levels from [=5RiskLevels=] as well as [=ExtremelyHighRisk=] (0.99) and [=ExtremelyLowRisk=] (0.01)
      • +
    • +
    -
      +
      • risk:3LikelihoodLevels: Scale with 3 Likelihood Levels from High to Low go to full definition @@ -951,6 +960,7 @@

        Likelihood, Severity, and Levels

      +
    @@ -1340,6 +1350,63 @@

    Taxonomies

    Potential Risk Sources

      +
    • + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition + +
    • +
    • + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • +
    • + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:UserRisks: Concepts associated with risks that arise due to User or Human use + go to full definition +
          +
        • + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition + +
        • +
        • + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition + +
        • +
        • + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
            +
          • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition + +
          • +
          • + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition + +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition + +
    • +
    • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -1455,12 +1522,12 @@

        Potential Risk Sources

        go to full definition
        • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser go to full definition
        • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised go to full definition
        • @@ -1469,237 +1536,232 @@

          Potential Risk Sources

          go to full definition
          • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
          • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
          • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
          • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
          • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
          • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
          • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
          • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
          • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
          • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
          • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
        • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
          • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
          • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
          • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
            • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
          • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
          • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
          • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
        • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity + risk:UnauthorisedActivity: Concept representing Unauthorised Activity go to full definition
          • - risk:UnauthorisedAccesstoPremises: Something that acts as or causes Unauthorised Access to Premises + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises go to full definition
          • - risk:UnauthorisedCodeAccess: Something that acts as or causes Unauthorised Code Access + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access go to full definition
          • - risk:UnauthorisedCodeDisclosure: Something that acts as or causes Unauthorised Code Disclosure + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure go to full definition
          • - risk:UnauthorisedCodeModification: Something that acts as or causes Unauthorised Code Modification + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification go to full definition
          • - risk:UnauthorisedDataAccess: Something that acts as or causes Unauthorised Data Access + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access go to full definition
          • - risk:UnauthorisedDataDisclosure: Something that acts as or causes Unauthorised Data Disclosure + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure go to full definition
          • - risk:UnauthorisedDataModification: Something that acts as or causes Unauthorised Data Modification + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification go to full definition
          • - risk:UnauthorisedInformationDisclosure: Something that acts as or causes Unauthorised Information Disclosure + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure go to full definition
          • - risk:UnauthorisedReidentification: Something that acts as or causes Unauthorised Re-Identification + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification go to full definition
          • - risk:UnauthorisedResourceUse: Something that acts as or causes Unauthorised Resource Use + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use go to full definition
          • - risk:UnauthorisedSystemAccess: Something that acts as or causes Unauthorised System Access + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access go to full definition
          • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification go to full definition
          • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion go to full definition
          • - risk:UnwantedDataDeletion: Something that acts as or causes Unwanted Data Deletion + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion go to full definition
          • - risk:UnwantedDisclosureData: Something that acts as or causes Unwanted Disclosure of Data + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data go to full definition
        -
      • -
      • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition -
      • risk:OperationalSecurityRisk: Risks and issues that arise during operational processes go to full definition
        • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure + risk:AuthorisationFailure: Concept representing Authorisation Failure go to full definition
        • - risk:ComponentFailure: Something that acts as or causes Component Failure + risk:ComponentFailure: Concept representing Component Failure go to full definition
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction + risk:ComponentMalfunction: Concept representing Component Malfunction go to full definition
        • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
        • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
        • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
        • - risk:Reidentification: Something that acts as or causes Re-identification + risk:Reidentification: Concept representing Re-identification go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach + risk:SecurityBreach: Concept representing Security Breach go to full definition
          • - risk:DataBreach: Something that acts as or causes Data Breach + risk:DataBreach: Concept representing Data Breach go to full definition
            • @@ -1708,7 +1770,7 @@

              Potential Risk Sources

            • - risk:ConfidentialityBreach: Something that acts as or causes Confidentiality Breach + risk:ConfidentialityBreach: Concept representing Confidentiality Breach go to full definition
            • @@ -1722,47 +1784,17 @@

              Potential Risk Sources

          • - risk:SystemFailure: Something that acts as or causes System Failure + risk:SystemFailure: Concept representing System Failure go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction + risk:SystemMalfunction: Concept representing System Malfunction go to full definition
        • -
        • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition -
    @@ -1772,285 +1804,153 @@

    Potential Risk Sources

    Potential Risks

    • - risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - go to full definition -
        -
      • - risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information - go to full definition -
          -
        • - risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - go to full definition - -
        • -
        • - risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
        • - risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
        • - risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
        • - risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
        • - risk:RequirementsBias: Bias that occurs in or during requirements creation - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
        • - risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
        • - risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society - go to full definition - -
        • -
        -
      • -
      • - risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition
        • - risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - go to full definition - -
        • -
        • - risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - go to full definition - -
        • -
        • - risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - go to full definition - -
        • -
        • - risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - go to full definition + risk:LegalComplianceRisk: Risks and consequences regarding legal compliance and its violation + go to full definition
          • - risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - go to full definition - -
          • -
          • - risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading - go to full definition - -
          • -
          • - risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - go to full definition -
              -
            • - risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
            • - risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - go to full definition + risk:IllegalDataProcessing: Concept representing Illegal Processing of Data + go to full definition
            • - risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population - go to full definition + risk:PublicOrderBreach: Concept representing Public Order Breach + go to full definition
            • -
            -
          • -
          -
        • -
        -
      • -
      -
    • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
    • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
    • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
    • -
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - +
  • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:LegallyRelevantConsequence: A consequence that is legally relevant i.e. actionable under law + go to full definition
    • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition - -
    • -
    • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition -
        -
      • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition - -
      • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:MaterialDamage: Concept representing Material Damage + go to full definition
      • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:NonMaterialDamage: Concept representing Non-Material Damage + go to full definition
    • -
    -
  • - risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals - go to full definition -
      -
    • - risk:Harm: Something that acts as or causes Harm to humans - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
    • -
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition - -
    • -
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
    • @@ -2058,229 +1958,369 @@

      Potential Risks

      go to full definition
      • - risk:Blackmail: Something that acts as or causes Blackmail + risk:Blackmail: Concept representing Blackmail go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion + risk:Coercion: Concept representing Coercion go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion + risk:Extorsion: Concept representing Extorsion go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud + risk:Fraud: Concept representing Fraud go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud + risk:IdentityFraud: Concept representing Identity Fraud go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft + risk:IdentityTheft: Concept representing Identity Theft go to full definition
      • - risk:InterceptCommunications: Something that acts as or causes Interception of Communications + risk:InterceptCommunications: Concept representing Interception of Communications go to full definition
      • - risk:PhishingScam: Something that acts as or causes Phishing Scam + risk:PhishingScam: Concept representing Phishing Scam go to full definition
      • - risk:Sabotage: Something that acts as or causes Sabotage + risk:Sabotage: Concept representing Sabotage go to full definition
      • - risk:Scam: Something that acts as or causes Scam + risk:Scam: Concept representing Scam go to full definition
      • - risk:Spoofing: Something that acts as or causes Spoofing + risk:Spoofing: Concept representing Spoofing go to full definition
    • - risk:OperationalSecurityRisk: Risks and issues that arise during operational processes - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
      • - risk:AuthorisationFailure: Something that acts as or causes Authorisation Failure - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition +
            +
          • + risk:JudicialCosts: Something that involves or causes judicial costs to be paid + go to full definition
          • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition + risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid + go to full definition
          • +
          +
        • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
              +
            • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
            • +
            +
          • - risk:DataCorruption: Something that acts as or causes Corruption of Data - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
          • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
          • +
          +
        • +
        +
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
      • - risk:SecurityAttack: Something that acts as or causes an attack on security with the aim of undermining it + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it go to full definition
        • - risk:BruteForceAuthorisations: Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques go to full definition
        • - risk:Cryptojacking: Something that acts as or causes Cryptojacking + risk:Cryptojacking: Concept representing Cryptojacking go to full definition
        • - risk:DenialServiceAttack: Something that acts as or causes Denial of Service Attack (DoS) + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) go to full definition
          • - risk:DistributedDenialServiceAttack: Something that acts as or causes Distributed Denial of Service Attack (DDoS) + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) go to full definition
        • - risk:MaliciousCodeAttack: Something that acts as or causes Malicious Code Attack + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack go to full definition
        • - risk:MalwareAttack: Something that acts as or causes Malware Attack + risk:MalwareAttack: Concept representing Malware Attack go to full definition
        • - risk:SystemIntrusion: Something that acts as or causes System Intrusion + risk:SystemIntrusion: Concept representing System Intrusion go to full definition
      • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition
        • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate go to full definition
          • @@ -2399,58 +2439,16 @@

            Potential Risks

        • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition - -
        • -
        • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
        • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition
          • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition - -
          • -
          • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition - -
          • -
          • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition - -
          • -
          • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition - -
          • -
          • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition - -
          • -
          • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition - -
          • -
          • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition - -
          • -
          -
        • -
        • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage + risk:SocialDisadvantage: Concept representing Social Disadvantage go to full definition
        • @@ -2460,161 +2458,131 @@

          Potential Risks

        • - risk:Terrorism: Something that acts as or causes Terrorism + risk:Terrorism: Concept representing Terrorism go to full definition
      • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition
      • - risk:UserRisks: Concepts associated with risks that arise due to User or Human use - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition -
      • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
      • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
      • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
      • -
      • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition - +
    • -
    • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition - +
  • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition - -
  • -
    -
    - -
    -

    Potential Consequences

    -
      + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition +
      • risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others go to full definition @@ -2726,98 +2694,79 @@

        Potential Consequences

    • - risk:ComponentFailure: Something that acts as or causes Component Failure - go to full definition - -
    • -
    • - risk:ComponentMalfunction: Something that acts as or causes Component Malfunction - go to full definition - -
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition +
      • - risk:CompromiseAccount: Something that acts as or causes a compromised account that is then used by the compromiser - go to full definition + risk:AuthorisationFailure: Concept representing Authorisation Failure + go to full definition
      • - risk:CompromiseAccountCredentials: Something that acts as or causes Account Credentials to be compromised - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
      • - risk:CopyrightViolation: Something that acts as or causes Copyright Violation - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:DataCorruption: Something that acts as or causes Corruption of Data + risk:DataCorruption: Concept representing Corruption of Data go to full definition
      • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition - -
      • -
      • - risk:EquipmentFailure: Something that acts as or causes Equipment Failure + risk:EquipmentFailure: Concept representing Equipment Failure go to full definition
      • - risk:EquipmentMalfunction: Something that acts as or causes Equipment Malfunction + risk:EquipmentMalfunction: Concept representing Equipment Malfunction go to full definition
      • - risk:ErroneousSystemUse: Something that acts as or causes Erroneous System Use - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
      • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition
        • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:DataBreach: Concept representing Data Breach + go to full definition -
        • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition - +
        • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
        • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
        @@ -2825,257 +2774,271 @@

        Potential Consequences

    • - risk:HumanErrors: Something that acts as or causes Human Errors - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
    +
    + +
    +

    Potential Consequences

    +
    • - risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - go to full definition + risk:ComponentFailure: Concept representing Component Failure + go to full definition
    • - risk:LegalRisk: Risks and issues that have their basis in legal requirements and enforcement - go to full definition -
        -
      • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:ComponentMalfunction: Concept representing Component Malfunction + go to full definition
      • - risk:Detriment: Something that acts as or causes Detriment - go to full definition + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition
      • - risk:IllegalDataProcessing: Something that acts as or causes Illegal Processing of Data - go to full definition + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition
      • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:DataCorruption: Concept representing Corruption of Data + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
      • - risk:PublicOrderBreach: Something that acts as or causes Public Order Breach - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
      • -
      -
    • - risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others - go to full definition -
        + risk:EquipmentFailure: Concept representing Equipment Failure + go to full definition + +
      • - risk:Blackmail: Something that acts as or causes Blackmail - go to full definition + risk:EquipmentMalfunction: Concept representing Equipment Malfunction + go to full definition
      • - risk:Coercion: Something that acts as or causes Coercion - go to full definition + risk:ErroneousUse: Concept representing erroneous use (of something) + go to full definition
      • - risk:Extorsion: Something that acts as or causes Extorsion - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
      • - risk:Fraud: Something that acts as or causes Fraud - go to full definition + risk:HumanErrors: Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + go to full definition
      • - risk:IdentityFraud: Something that acts as or causes Identity Fraud - go to full definition + risk:InformativenessBias: Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + go to full definition
      • - risk:IdentityTheft: Something that acts as or causes Identity Theft - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition + risk:PolicyRisk: Risks and consequences regarding policy and its associated processes + go to full definition
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:ViolatingCodeOfConduct: Concept representing Violation of Code of Conduct + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:ViolatingEthicsCode: Concept representing Violation of Ethics Code + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition - -
        • + risk:ViolatingObligation: Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + go to full definition +
          • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:CopyrightViolation: Concept representing Copyright Violation + go to full definition
          • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:ViolatingContractualObligation: Concept representing Violation of Contractual Obligations + go to full definition
          • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:ViolatingLegalObligation: Concept representing Violation of Legal Obligations + go to full definition
          • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:ViolatingStatutoryObligations: Concept representing Violation of Statutory Obligations + go to full definition
        • - risk:SecurityBreach: Something that acts as or causes Security Breach - go to full definition -
            -
          • - risk:DataBreach: Something that acts as or causes Data Breach - go to full definition - @@ -3083,379 +3046,487 @@

            Potential Consequences

        • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition -
            -
          • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition
            • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:Blackmail: Concept representing Blackmail + go to full definition
            • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:Coercion: Concept representing Coercion + go to full definition
            • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:Extorsion: Concept representing Extorsion + go to full definition
            • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:Fraud: Concept representing Fraud + go to full definition
            • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:IdentityFraud: Concept representing Identity Fraud + go to full definition
            • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:IdentityTheft: Concept representing Identity Theft + go to full definition
            • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:InterceptCommunications: Concept representing Interception of Communications + go to full definition
            • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:PhishingScam: Concept representing Phishing Scam + go to full definition
            • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:Sabotage: Concept representing Sabotage + go to full definition
            • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition -
            • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:Misuse: Concept representing a misuse (of something) + go to full definition +
                +
              • + risk:AccidentalMisuse: Concept representing accidental misuse (of something) + go to full definition
              • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:IntentionalMisuse: Concept represent an intentional misuse (of something) + go to full definition
              • +
              +
            • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition
              • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
                  +
                • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
                • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
                    +
                  • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
                      +
                    • + risk:Benefit: Concept representing benefits - both material and immaterial + go to full definition
                    • +
                    +
                  • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition
                  • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition
                • +
                +
              • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition
                • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:LoseCredibility: Concept representing Loss of Credibility + go to full definition
                • -
                +
              • + risk:LoseCustomerConfidence: Concept representing Loss of Customer Confidence + go to full definition +
              • -
              +
            • + risk:LoseGoodwill: Concept representing Loss of Goodwill + go to full definition +
            • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:LoseNegotiatingCapacity: Concept representing Loss of Negotiating Capacity + go to full definition
            • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:LoseOpportunity: Concept representing Loss of Opportunity + go to full definition
            • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition - +
            • +
            • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition +
              • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:CustomerSupportLimited: Concept representing customer support to be limited + go to full definition
              • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DelayedApplicationProcessing: Concept representing delayed processing of applications + go to full definition
              • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:IdentityVerificationFailure: Concept representing failure to verify identity + go to full definition
              • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:InabilityToEnterIntoContract: Stub + go to full definition
              • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:InabilityToEstablishLegalClaims: Stub + go to full definition
              • - risk:RightsViolation: The infringement or breach of rights in a manner that constitues a 'violation' of those rights - go to full definition + risk:InabilityToFulfillLegalObligations: Stub + go to full definition
              • -
              +
            • + risk:InabilityToProcessPayments: Stub + go to full definition +
            • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:InabilityToProtectVitalInterests: Stub + go to full definition
            • - risk:SocietalHealthSafety: None - go to full definition + risk:InabilityToProvideHealthCare: Stub + go to full definition
            • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:LegalSupportLimited: Stub + go to full definition
            • -
            +
          • + risk:LoyaltyProgramExclusion: Stub + go to full definition +
          • - risk:SystemFailure: Something that acts as or causes System Failure - go to full definition + risk:PersonalisationDisabled: Stub + go to full definition
          • - risk:SystemMalfunction: Something that acts as or causes System Malfunction - go to full definition + risk:PersonalisationEnabled: Stub + go to full definition
          • - risk:UnauthorisedActivity: Something that acts as or causes Unauthorised Activity - go to full definition - +
          • +
          +
        • - risk:UnauthorisedSystemModification: Something that acts as or causes Unauthorised System Modification - go to full definition + risk:Reidentification: Concept representing Re-identification + go to full definition
        • - risk:UnwantedCodeDeletion: Something that acts as or causes Unwanted Code Deletion - go to full definition + risk:SecurityBreach: Concept representing Security Breach + go to full definition + +
        • - risk:ViolatingCodeOfConduct: Something that acts as or causes Violation of Code of Conduct - go to full definition + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
            +
          • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
              +
            • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition
            • - risk:ViolatingContractualObligation: Something that acts as or causes Violation of Contractual Obligations - go to full definition + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition
            • - risk:ViolatingEthicsCode: Something that acts as or causes Violation of Ethics Code - go to full definition + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition
            • - risk:ViolatingLegalObligation: Something that acts as or causes Violation of Legal Obligations - go to full definition + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition
            • - risk:ViolatingPolicy: Something that acts as or causes violation of policy which can be either internal or external policy - go to full definition + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition
            • - risk:ViolatingStatutoryObligations: Something that acts as or causes Violation of Statutory Obligations - go to full definition + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition
            • -
    -
    - -
    -

    Potential Impacts

    -
    • - risk:Damage: Something that acts as or causes Damage - go to full definition + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition
    • - risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large - go to full definition + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition
    • - risk:FinancialImpact: Things that cause or have the potential to impact financial resources - go to full definition -
        + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • - risk:FinancialLoss: Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - go to full definition + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition
        • - risk:JudicialCosts: Something that involves or causes judicial costs to be paid - go to full definition + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition
        • - risk:JudicialPenalty: Something that involves or causes judicial penalties to be paid - go to full definition + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition
      • - risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form - go to full definition + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition
        • - risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms - go to full definition + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition
        • - risk:Benefit: Something that acts as or causes benefits - go to full definition + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition
      • +
      +
    • - risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources - go to full definition + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition
    • - risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - go to full definition + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • + risk:SocietalHealthSafety: None + go to full definition + +
    • +
    • + risk:Terrorism: Concept representing Terrorism + go to full definition +
    @@ -3464,7 +3535,12 @@

    Potential Impacts

    go to full definition
    • - risk:Harm: Something that acts as or causes Harm to humans + risk:ExposureToHarmfulSpeech: Concept representing Harmful Speech + go to full definition + +
    • +
    • + risk:Harm: Concept representing Harm to humans go to full definition
      • @@ -3473,12 +3549,12 @@

        Potential Impacts

      • - risk:Injury: Something that acts as or causes Injury + risk:Injury: Concept representing Injury go to full definition
      • - risk:PhysicalAssault: Something that acts as or causes Physical Assault + risk:PhysicalAssault: Concept representing Physical Assault go to full definition
      • @@ -3488,7 +3564,7 @@

        Potential Impacts

      • - risk:PsychologicalHarm: Something that acts as or causes Psychological Harm + risk:PsychologicalHarm: Concept representing Psychological Harm go to full definition
      • @@ -3498,12 +3574,12 @@

        Potential Impacts

      • - risk:SexualViolence: Something that acts as or causes Sexual Violence + risk:SexualViolence: Concept representing Sexual Violence go to full definition
      • - risk:ViolenceAgainstChildren: Something that acts as or causes Child Violence + risk:ViolenceAgainstChildren: Concept representing Child Violence go to full definition
      • @@ -3513,6 +3589,11 @@

        Potential Impacts

        risk:IndividualHealthSafety: None go to full definition + +
      • + risk:PersonalSafetyEndangerment: Concept representing Personal Safety Endangerment + go to full definition +
      • risk:Privacy: None @@ -3522,266 +3603,1860 @@

        Potential Impacts

    • - risk:MaterialDamage: Something that acts as or causes Material Damage - go to full definition + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition
      • - risk:NonMaterialDamage: Something that acts as or causes Non-Material Damage - go to full definition + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition
      • - risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation - go to full definition -
          -
        • - risk:LoseCredibility: Something that acts as or causes Loss of Credibility - go to full definition + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition
        • - risk:LoseCustomerConfidence: Something that acts as or causes Loss of Customer Confidence - go to full definition + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition
        • - risk:LoseGoodwill: Something that acts as or causes Loss of Goodwill - go to full definition + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition
        • - risk:LoseNegotiatingCapacity: Something that acts as or causes Loss of Negotiating Capacity - go to full definition + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition
        • - risk:LoseOpportunity: Something that acts as or causes Loss of Opportunity - go to full definition + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition
        • +
        +
      • +
      +
    • - risk:LoseReputation: Something that acts as or causes Loss of Reputation - go to full definition + risk:SystemFailure: Concept representing System Failure + go to full definition
    • - risk:LoseTrust: Something that acts as or causes Loss of Trust - go to full definition + risk:SystemMalfunction: Concept representing System Malfunction + go to full definition
    • -
    -
  • - risk:SocietalRisk: Risks and issues that affect or have the potential to affect society at large or specific groups in society - go to full definition + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition
    • - risk:Discrimination: [rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')] - go to full definition + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition
      • - risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals - go to full definition + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition
        • - risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures - go to full definition + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition
        • - risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - go to full definition + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition
        • - risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities - go to full definition + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition
        • - risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others - go to full definition + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition
        • - risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence - go to full definition + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition
        • - risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - go to full definition + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition
        • - risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity - go to full definition + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition
        • +
        +
      • - risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship - go to full definition + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition
        • - risk:Racism: Prejudice or discrimination against people based on their race - go to full definition + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition
          • - risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage - go to full definition + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition
          • - risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color - go to full definition + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition
          • -
          +
        • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
            +
          • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition +
          • - risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices - go to full definition + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition
          • - risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - go to full definition + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition
          • +
          +
        • +
        +
      • +
      +
    • +
    +
  • + +
  • - risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping - go to full definition + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition
    • - risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression - go to full definition + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition
    • - risk:Misandry: Dislike, contempt, or prejudice against men - go to full definition + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition
    • - risk:Misogyny: Dislike, contempt, or prejudice against women - go to full definition + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition
    • - risk:SexDiscrimination: Discrimination based on a person's biological sex - go to full definition + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition
    • - risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - go to full definition + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition
    • -
    +
  • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition +
  • - risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - go to full definition -
      + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
    • - risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual - go to full definition + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition
    • -
    +
  • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition +
  • - +
  • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition +
  • - risk:ExposureToHarmfulSpeech: Something that acts as or causes Harmful Speech - go to full definition + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition
  • - risk:PersonalSafetyEndangerment: Something that acts as or causes Personal Safety Endangerment - go to full definition + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition
  • - risk:RightsImpact: Something that acts as or causes Impact to Rights - go to full definition -
      + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
    • - risk:RightEroded: The gradual weakening or reduction of the scope and protection of rights - go to full definition + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition
    • - risk:RightObstructed: Interference with or blocking of the exercise of rights - go to full definition + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition
    • +
    +
  • +
    +
    + +
    +

    Potential Impacts

    +
    • - risk:RightsDenial: The refusal or withholding or denial of the existence or applicability of rights - go to full definition + risk:DisproportionateEnergyConsumption: The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + go to full definition
    • - risk:RightsExercisePrevention: Actions or measures that prevent an individual or group from exercising their legal rights. - go to full definition + risk:Earthquake: The occurence or potential occurence of earthquakes + go to full definition
    • - risk:RightsLimitation: A limitation or restrictions on the scope or exercise of rights - go to full definition + risk:Floods: The occurence or potential occurence of floods + go to full definition
    • - risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights - go to full definition + risk:LegalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + go to full definition + +
    • - risk:SocialDisadvantage: Something that acts as or causes Social Disadvantage - go to full definition + risk:OrganisationalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + go to full definition +
        +
      • + risk:FinancialImpact: Things that cause or have the potential to impact financial resources + go to full definition +
          +
        • + risk:FinancialLoss: Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + go to full definition + +
        • - risk:Terrorism: Something that acts as or causes Terrorism - go to full definition + risk:Renumeration: Something that acts as or provides renumeration which is in monetary or financial form + go to full definition +
            +
          • + risk:Compensation: Something that acts as or provides compensation - which can be monetary and financial or in other forms + go to full definition +
          • -
    -
    - -
    -

    Overview of Concepts and Roles

    - - - - - - - - - - - - - - +
  • + risk:Payment: Something that acts as or provides payment e.g. to access a service or purchase resources + go to full definition + +
  • +
  • + risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + go to full definition + +
  • + + + + +
  • + risk:ReputationalRisk: Risks and issues that affect the reputation of the organisation + go to full definition + +
  • +
  • + risk:ServiceRelatedConsequence: A consequence related to the provision of a service + go to full definition + +
  • + + +
  • + risk:SocietalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + go to full definition +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
  • +
  • + risk:TechnicalRiskConcept: Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + go to full definition + +
  • + + + +
    +

    Technical Risk Concepts

    +
      +
    • + risk:Bias: Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + go to full definition +
        +
      • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
          +
        • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
        • +
        • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
        • +
        • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
        • +
        • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
        • +
        • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
        • +
        • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
        • +
        • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
        • +
        • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
        • +
        +
      • +
      • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
          +
        • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
        • +
        • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
        • +
        • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
        • +
        • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
            +
          • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
          • +
          • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
          • +
          • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
              +
            • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
            • +
            • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
            • +
            • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
            • +
            +
          • +
          +
        • +
        +
      • +
      +
    • +
    • + risk:ExternalSecurityThreat: Concepts associated with security threats that are likely to originate externally + go to full definition +
        +
      • + risk:CompromiseAccount: Concept representing a compromised account that is then used by the compromiser + go to full definition + +
      • +
      • + risk:CompromiseAccountCredentials: Concept representing Account Credentials to be compromised + go to full definition + +
      • +
      • + risk:MaliciousActivity: Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + go to full definition + +
      • +
      • + risk:SecurityAttack: Concept representing an attack on security with the aim of undermining it + go to full definition +
          +
        • + risk:BruteForceAuthorisations: Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + go to full definition + +
        • +
        • + risk:Cryptojacking: Concept representing Cryptojacking + go to full definition + +
        • +
        • + risk:DenialServiceAttack: Concept representing Denial of Service Attack (DoS) + go to full definition +
            +
          • + risk:DistributedDenialServiceAttack: Concept representing Distributed Denial of Service Attack (DDoS) + go to full definition + +
          • +
          +
        • +
        • + risk:MaliciousCodeAttack: Concept representing Malicious Code Attack + go to full definition + +
        • +
        • + risk:MalwareAttack: Concept representing Malware Attack + go to full definition + +
        • +
        • + risk:SystemIntrusion: Concept representing System Intrusion + go to full definition + +
        • +
        +
      • +
      • + risk:UnauthorisedActivity: Concept representing Unauthorised Activity + go to full definition +
          +
        • + risk:UnauthorisedAccesstoPremises: Concept representing Unauthorised Access to Premises + go to full definition + +
        • +
        • + risk:UnauthorisedCodeAccess: Concept representing Unauthorised Code Access + go to full definition + +
        • +
        • + risk:UnauthorisedCodeDisclosure: Concept representing Unauthorised Code Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedCodeModification: Concept representing Unauthorised Code Modification + go to full definition + +
        • +
        • + risk:UnauthorisedDataAccess: Concept representing Unauthorised Data Access + go to full definition + +
        • +
        • + risk:UnauthorisedDataDisclosure: Concept representing Unauthorised Data Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedDataModification: Concept representing Unauthorised Data Modification + go to full definition + +
        • +
        • + risk:UnauthorisedInformationDisclosure: Concept representing Unauthorised Information Disclosure + go to full definition + +
        • +
        • + risk:UnauthorisedReidentification: Concept representing Unauthorised Re-Identification + go to full definition + +
        • +
        • + risk:UnauthorisedResourceUse: Concept representing Unauthorised Resource Use + go to full definition + +
        • +
        • + risk:UnauthorisedSystemAccess: Concept representing Unauthorised System Access + go to full definition + +
        • +
        • + risk:UnauthorisedSystemModification: Concept representing Unauthorised System Modification + go to full definition + +
        • +
        • + risk:UnwantedCodeDeletion: Concept representing Unwanted Code Deletion + go to full definition + +
        • +
        • + risk:UnwantedDataDeletion: Concept representing Unwanted Data Deletion + go to full definition + +
        • +
        • + risk:UnwantedDisclosureData: Concept representing Unwanted Disclosure of Data + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:OperationalSecurityRisk: Risks and issues that arise during operational processes + go to full definition + +
    • +
    +
    + +
    +

    Organisational Risk Concepts

    +
    +
    + +
    +

    Societal Risk Concepts

    +
      +
    • + risk:Discrimination: Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + go to full definition +
        +
      • + risk:AgeDiscrimination: Discrimination based on a person's age, often impacting older or younger individuals + go to full definition + +
      • +
      • + risk:CasteDiscrimination: Discrimination based on a person's caste, a form of social stratification found in some cultures + go to full definition + +
      • +
      • + risk:DirectDiscrimination: Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + go to full definition + +
      • +
      • + risk:DisabilityDiscrimination: Discrimination against individuals based on physical or mental disabilities + go to full definition + +
      • +
      • + risk:ExcellenceDiscrimination: Favoritism towards individuals deemed more competent or superior, often at the expense of others + go to full definition + +
      • +
      • + risk:GeographicDiscrimination: Discrimination based on a person's geographical origin or residence + go to full definition + +
      • +
      • + risk:IndirectDiscrimination: Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + go to full definition + +
      • +
      • + risk:LanguageDiscrimination: Discrimination based on a person's language, often linked to national origin or ethnicity + go to full definition + +
      • +
      • + risk:NationalityDiscrimination: Discrimination based on a person's nationality or citizenship + go to full definition + +
      • +
      • + risk:Racism: Prejudice or discrimination against people based on their race + go to full definition +
          +
        • + risk:EthnicDiscrimination: Discrimination against individuals based on their ethnicity or cultural heritage + go to full definition + +
        • +
        • + risk:RacialDiscrimination: Discrimination against individuals because of their racial background or skin color + go to full definition + +
        • +
        +
      • +
      • + risk:ReligiousDiscrimination: Discrimination based on a person's religious beliefs or practices + go to full definition + +
      • +
      • + risk:ReverseDiscrimination: Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + go to full definition + +
      • +
      • + risk:Sexism: Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + go to full definition +
          +
        • + risk:GenderDiscrimination: Discrimination based on a person's gender identity or gender expression + go to full definition + +
        • +
        • + risk:Misandry: Dislike, contempt, or prejudice against men + go to full definition + +
        • +
        • + risk:Misogyny: Dislike, contempt, or prejudice against women + go to full definition + +
        • +
        • + risk:SexDiscrimination: Discrimination based on a person's biological sex + go to full definition + +
        • +
        • + risk:Transphobia: Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + go to full definition + +
        • +
        +
      • +
      • + risk:SexualOrientationDiscrimination: Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + go to full definition +
          +
        • + risk:Homophobia: Hostility or prejudice against individuals who are or are perceived to be homosexual + go to full definition + +
        • +
        +
      • +
      +
    • +
    • + risk:EnvironmentalRisk: Risks and issues that have their origin in environment or can affect the environment at large + go to full definition + +
    • +
    • + risk:GroupRisk: Risks and issues that affect or have the potential to affect groups in society + go to full definition + +
    • +
    • + risk:IndividualRisk: Risks and issues that affect or have the potential to affect specific individuals + go to full definition + +
    • +
    • + risk:RightsImpact: Concept representing Impact to Rights + go to full definition +
        +
      • + risk:RightsDenied: The refusal or withholding or denial of the existence or applicability of rights + go to full definition + +
      • +
      • + risk:RightsEroded: The gradual weakening or reduction of the scope and protection of rights + go to full definition + +
      • +
      • + risk:RightsExercisePrevented: Actions or measures that prevent an individual or group from exercising their legal rights. + go to full definition + +
      • +
      • + risk:RightsLimited: A limitation or restrictions on the scope or exercise of rights + go to full definition + +
      • +
      • + risk:RightsObstructed: Interference with or blocking of the exercise of rights + go to full definition + +
      • +
      • + risk:RightsUnfulfilled: Failure to meet or complete the fulfilment of rights + go to full definition + +
      • +
      • + risk:RightsViolated: The infringement or breach of rights in a manner that constitues a 'violation' of those rights + go to full definition + +
      • +
      +
    • +
    +
    + + + +
    +

    Overview of Concepts and Roles

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality
    + + + + + + + + + + + + + @@ -4007,6 +5682,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4067,6 +5752,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4082,7 +5777,7 @@

    Overview of Concepts and Roles

    - + @@ -4117,6 +5812,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4127,6 +5832,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4158,7 +5873,7 @@

    Overview of Concepts and Roles

    - + @@ -4237,6 +5952,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4277,6 +6002,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4337,6 +6072,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4357,6 +6102,66 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4478,13 +6283,43 @@

    Overview of Concepts and Roles

    - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -4557,6 +6392,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4677,6 +6522,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4697,6 +6552,26 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + @@ -4737,6 +6612,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4767,6 +6652,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -4858,7 +6753,7 @@

    Overview of Concepts and Roles

    - + @@ -4868,7 +6763,7 @@

    Overview of Concepts and Roles

    - + @@ -4878,7 +6773,7 @@

    Overview of Concepts and Roles

    - + @@ -4888,7 +6783,7 @@

    Overview of Concepts and Roles

    - + @@ -4898,7 +6793,7 @@

    Overview of Concepts and Roles

    - + @@ -4908,7 +6803,7 @@

    Overview of Concepts and Roles

    - + @@ -4928,7 +6823,7 @@

    Overview of Concepts and Roles

    - + @@ -5007,6 +6902,126 @@

    Overview of Concepts and Roles

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -5098,8 +7113,8 @@

    Overview of Concepts and Roles

    - - + + @@ -5157,6 +7172,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5387,6 +7412,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5397,6 +7432,16 @@

    Overview of Concepts and Roles

    + + + + + + + + + + @@ -5422,192 +7467,2009 @@

    Overview of Concepts and Roles

    - -
    -

    Risk Matrix

    -

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    -

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    +
    + +
    +

    Rights Impacts

    +

    lorem ipsum

    +
    + +
    +

    Risk Matrix

    +

    Risk Matrix is a popularly used technique for qualitative risk analysis, through which a risk's likelihood and severity are used to obtain an overall risk level. To support its use, the RISK taxonomy provides concepts representing risk matrices of the format 3x3, 5x5, and 7x7. The concepts are expressed as combinations of Severity (Sx) and Likelihood (Lx) levels, and the resulting Risk Level (Lx) being used as its label. For example, the concept [=RM3x3S1L3=] represents a node in a 3x3 matrix with Severity and Likelihood level low (n=1) and Likelihood level high (n=3) with a resulting Risk Level of 'Moderate'. Similarly, [=RM7x7S4L7=] represents a node in a 7x7 risk matrix with Severity level moderate (n=4) and Likelihood level extremely high (n=7) with the resulting Risk Level of 'Very High Risk'.

    +

    It is possible to change the risk levels for the risk matrix by replacing the supplied labels with a custom one. For example, to indicate that the concept [=RM3x3S1L3=] should be 'Low Risk' instead of 'Moderate'.

    + +
    +

    Risk Matrix 3x3

    +
    ConceptRolesCIA model
    Risk SourceRiskConsequenceImpactConfidentiality Integrity Availability
    risk:CustomerSupportLimited
    risk:Damage
    risk:DelayedApplicationProcessing
    risk:DenialServiceAttack
    risk:DisproportionateEnergyConsumption
    risk:DistributedDenialServiceAttack
    risk:Earthquake
    risk:EnvironmentalRisk
    risk:ErroneousSystemUserisk:ErroneousUse
    risk:Floods
    risk:Fraud
    risk:GroupRisk
    risk:Harassment
    risk:IdentityVerificationFailure
    risk:IllegalDataProcessing
    risk:InabilityToEnterIntoContract
    risk:InabilityToEstablishLegalClaims
    risk:InabilityToFulfillLegalObligations
    risk:InabilityToProcessPayments
    risk:InabilityToProtectVitalInterests
    risk:InabilityToProvideHealthCare
    risk:IndirectDiscrimination
    risk:LegalRiskrisk:LegalComplianceRisk
    risk:LegallyRelevantConsequence
    risk:LegalRiskConcept
    risk:LegalSupportLimited
    risk:LoyaltyProgramExclusion
    risk:MaliciousActivity
    risk:OrganisationalRiskConcept
    risk:OutGroupHomogeneityBias
    risk:PersonalisationDisabled
    risk:PersonalisationEnabled
    risk:PersonalSafetyEndangerment
    risk:PolicyRisk
    risk:Privacy
    risk:PublicServicesExclusion
    risk:RacialDiscrimination
    risk:RightErodedrisk:RightsDenied
    risk:RightObstructedrisk:RightsEroded
    risk:RightsDenialrisk:RightsExercisePrevented
    risk:RightsExercisePreventionrisk:RightsImpact
    risk:RightsImpactrisk:RightsLimited
    risk:RightsLimitationrisk:RightsObstructed
    risk:RightsViolationrisk:RightsViolated
    risk:ServiceAlternativeOffered
    risk:ServiceCostIncreased
    risk:ServiceDenied
    risk:ServiceLimited
    risk:ServiceNotProvided
    risk:ServicePartiallyProvided
    risk:ServiceProvided
    risk:ServiceProvisionDelayed
    risk:ServiceQualityReduced
    risk:ServiceRelatedConsequence
    risk:ServiceSecurityReduced
    risk:ServiceTermination
    risk:SexDiscrimination
    risk:SocietalRiskrisk:SocietalRiskConcept
    risk:TechnicalRiskConcept
    risk:Terrorism
    risk:ViolatingObligation
    risk:ViolatingPolicy
    risk:ViolatingProhibition
    risk:ViolatingStatutoryObligations
    + + + + + + + + + + + + + + + + + + + + + + + + +
    LowModerateHigh
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]
    +
    + +
    +

    Risk Matrix 5x5

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Very LowLowModerateHighVery High
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]
    +
    + +
    +

    Risk Matrix 7x7

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely High
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]
    +
    + +
    + + +
    +

    Vocabulary Index

    +
    +

    Classes

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    +

    3 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3LikelihoodLevelsPrefixrisk
    Label3 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 3 Likelihood Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3RiskLevelsPrefixrisk
    Label3 Risk Levels
    IRIhttps://w3id.org/dpv/risk#3RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 3 Risk Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    3 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term3SeverityLevelsPrefixrisk
    Label3 Severity Levels
    IRIhttps://w3id.org/dpv/risk#3SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 3 Severity Levels from High to Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5LikelihoodLevelsPrefixrisk
    Label5 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 5 Likelihood Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5RiskLevelsPrefixrisk
    Label5 Risk Levels
    IRIhttps://w3id.org/dpv/risk#5RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 5 Risk Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    5 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term5SeverityLevelsPrefixrisk
    Label5 Severity Levels
    IRIhttps://w3id.org/dpv/risk#5SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 5 Severity Levels from Very High to Very Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Likelihood Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7LikelihoodLevelsPrefixrisk
    Label7 Likelihood Levels
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevels
    Typerdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types dpv:Likelihood +
    Object of relation dpv:hasLikelihood +
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Risk Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7RiskLevelsPrefixrisk
    Label7 Risk Levels
    IRIhttps://w3id.org/dpv/risk#7RiskLevels
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskLevel +
    Object of relation dpv:hasRiskLevel +
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + + +
    +

    7 Severity Levels

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Term7SeverityLevelsPrefixrisk
    Label7 Severity Levels
    IRIhttps://w3id.org/dpv/risk#7SeverityLevels
    Typerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types dpv:Severity +
    Object of relation dpv:hasSeverity +
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely Low
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK +
    +
    + + +
    +

    Accidental Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalIncidentPrefixrisk
    LabelAccidental Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situations
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + + + + +
    +

    Accidental Misuse

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAccidentalMisusePrefixrisk
    LabelAccidental Misuse
    IRIhttps://w3id.org/dpv/risk#AccidentalMisuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing accidental misuse (of something)
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Age Discrimination

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAgeDiscriminationPrefixrisk
    LabelAge Discrimination
    IRIhttps://w3id.org/dpv/risk#AgeDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionDiscrimination based on a person's age, often impacting older or younger individuals
    Date Created2024-09-30
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Authorisation Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAuthorisationFailurePrefixrisk
    LabelAuthorisation Failure
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Authorisation Failure
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    None

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityBreachPrefixrisk
    LabelNone
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    See More: section RISK-TAXONOMY in RISK +
    +
    + + +
    +

    Availability Concept

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityConceptPrefixrisk
    LabelAvailability Concept
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcept
    Typerdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskConcept +
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK +
    +
    + + +
    +

    Availability Incident

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermAvailabilityIncidentPrefixrisk
    LabelAvailability Incident
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncident
    Typerdfs:Class, skos:Concept
    Broader/Parent types risk:Incident + → dpv:RiskConcept +
    Object of relation risk:hasIncident +
    DefinitionIncident where the availability of information or system has been affected
    Date Created2024-05-19
    See More: section INCIDENT in RISK +
    +
    + + + +
    +

    Avoid Source

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
    -

    Risk Matrix 3x3

    -
    TermAvoidSourcePrefixrisk
    LabelAvoid Source
    IRIhttps://w3id.org/dpv/risk#AvoidSource
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that avoids the risk source
    - - - - - + + + + + + + + + + - - - - + + + +
    LowModerateHigh
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    High[=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=]See More: section RISK-CONTROLS in RISK +
    +
    + + + + + + +
    +

    Benefit

    + + - - - - + + + + - - - - + + -
    Moderate[=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=]TermBenefitPrefixrisk
    Low[=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=]LabelBenefit
    -
    + + IRI + https://w3id.org/dpv/risk#Benefit + + + + + + Type + rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk + + + + Broader/Parent types + risk:Compensation + → risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept + + + -
    -

    Risk Matrix 5x5

    - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + +
    Very LowLowModerateHighVery High
    DefinitionConcept representing benefits - both material and immaterial
    Usage NoteEven though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal
    Date Created2022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres
    Very High[=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Bias

    + + - - - - - - + + + + - - - - - - + + - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + -
    High[=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=]TermBiasPrefixrisk
    Moderate[=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=]LabelBias
    Low[=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=]
    IRIhttps://w3id.org/dpv/risk#Bias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    Very Low[=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=]See More: section RISK-TAXONOMY in AI +
    + +
    - -
    -

    Risk Matrix 7x7

    - + + + + + + + +
    +

    Blackmail

    +
    + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    Extremely LowVery LowLowModerateHighVery HighExtremely HighTermBlackmailPrefixrisk
    Extremely High[=RM7x7S1L7=][=RM7x7S2L7=][=RM7x7S3L7=][=RM7x7S4L7=][=RM7x7S5L7=][=RM7x7S6L7=][=RM7x7S7L7=]LabelBlackmail
    IRIhttps://w3id.org/dpv/risk#Blackmail
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Blackmail
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Very High[=RM7x7S1L6=][=RM7x7S2L6=][=RM7x7S3L6=][=RM7x7S4L6=][=RM7x7S5L6=][=RM7x7S6L6=][=RM7x7S7L6=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    Brute Force Authorisations

    + + - - - - - - - - + + + + - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - - - + + + +
    High[=RM7x7S1L5=][=RM7x7S2L5=][=RM7x7S3L5=][=RM7x7S4L5=][=RM7x7S5L5=][=RM7x7S6L5=][=RM7x7S7L5=]TermBruteForceAuthorisationsPrefixrisk
    Moderate[=RM7x7S1L4=][=RM7x7S2L4=][=RM7x7S3L4=][=RM7x7S4L4=][=RM7x7S5L4=][=RM7x7S6L4=][=RM7x7S7L4=]LabelBrute Force Authorisations
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisations
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Low[=RM7x7S1L3=][=RM7x7S2L3=][=RM7x7S3L3=][=RM7x7S4L3=][=RM7x7S5L3=][=RM7x7S6L3=][=RM7x7S7L3=]See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Caste Discrimination

    + + - - - - - - - - + + + + - - - - - - - - + + -
    Very Low[=RM7x7S1L2=][=RM7x7S2L2=][=RM7x7S3L2=][=RM7x7S4L2=][=RM7x7S5L2=][=RM7x7S6L2=][=RM7x7S7L2=]TermCasteDiscriminationPrefixrisk
    Extremely Low[=RM7x7S1L1=][=RM7x7S2L1=][=RM7x7S3L1=][=RM7x7S4L1=][=RM7x7S5L1=][=RM7x7S6L1=][=RM7x7S7L1=]LabelCaste Discrimination
    -
    + + IRI + https://w3id.org/dpv/risk#CasteDiscrimination + + + + + + Type + rdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept + + + + Broader/Parent types + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept + + + + + + + + + + + + Definition + Discrimination based on a person's caste, a form of social stratification found in some cultures + + + -
    + + + + + + + Date Created + 2024-09-30 + + -
    -

    Vocabulary Index

    -
    -

    Classes

    - - + + + See More: + section RISK-TAXONOMY in RISK + + + + +
    @@ -5615,11 +9477,169 @@

    Classes

    +
    +

    Change Consequence

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeConsequencePrefixrisk
    LabelChange Consequence
    IRIhttps://w3id.org/dpv/risk#ChangeConsequence
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Consequence
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    +
    +

    Change Impact

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermChangeImpactPrefixrisk
    LabelChange Impact
    IRIhttps://w3id.org/dpv/risk#ChangeImpact
    Typerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ImpactControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that changes Impact
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK +
    +
    @@ -5627,21 +9647,251 @@

    Classes

    +
    +

    Coercion

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCoercionPrefixrisk
    LabelCoercion
    IRIhttps://w3id.org/dpv/risk#Coercion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Coercion
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    +
    +

    Cognitive Bias

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCognitiveBiasPrefixrisk
    LabelCognitive Bias
    IRIhttps://w3id.org/dpv/risk#CognitiveBias
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionBias that occurs when humans are processing and interpreting information
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI +
    +
    +
    +

    Compensation

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompensationPrefixrisk
    LabelCompensation
    IRIhttps://w3id.org/dpv/risk#Compensation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other forms
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5649,7 +9899,76 @@

    Classes

    +
    +

    Component Failure

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentFailurePrefixrisk
    LabelComponent Failure
    IRIhttps://w3id.org/dpv/risk#ComponentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Failure
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5657,7 +9976,76 @@

    Classes

    +
    +

    Component Malfunction

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermComponentMalfunctionPrefixrisk
    LabelComponent Malfunction
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Component Malfunction
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5667,7 +10055,85 @@

    Classes

    +
    +

    Compromise Account

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountPrefixrisk
    LabelCompromise Account
    IRIhttps://w3id.org/dpv/risk#CompromiseAccount
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing a compromised account that is then used by the compromiser
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5675,7 +10141,85 @@

    Classes

    +
    +

    Compromise Account Credentials

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermCompromiseAccountCredentialsPrefixrisk
    LabelCompromise Account Credentials
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentials
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing Account Credentials to be compromised
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    @@ -5683,44 +10227,43 @@

    Classes

    - -
    -

    3 Likelihood Levels

    +
    +

    Confidentiality Breach

    - + - + - + - + - - - - - + @@ -5729,22 +10272,28 @@

    3 Likelihood Levels

    - + - + + + + - + - + + + + @@ -5753,7 +10302,7 @@

    3 Likelihood Levels

    - @@ -5761,44 +10310,39 @@

    3 Likelihood Levels

    - -
    -

    3 Risk Levels

    +
    +

    Confidentiality Concept

    Term3LikelihoodLevelsConfidentialityBreach Prefix risk
    Label3 Likelihood LevelsConfidentiality Breach
    IRIhttps://w3id.org/dpv/risk#3LikelihoodLevelshttps://w3id.org/dpv/risk#ConfidentialityBreach
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Likelihood + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 3 Likelihood Levels from High to LowConcept representing Confidentiality Breach
    SourceISO/IEC 27005:2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -5807,9 +10351,12 @@

    3 Risk Levels

    - + - + + + + @@ -5820,7 +10367,7 @@

    3 Risk Levels

    - + @@ -5831,7 +10378,7 @@

    3 Risk Levels

    - @@ -5839,42 +10386,42 @@

    3 Risk Levels

    - -
    -

    3 Severity Levels

    +
    +

    Confidentiality Incident

    Term3RiskLevelsConfidentialityConcept Prefix risk
    Label3 Risk LevelsConfidentiality Concept
    IRIhttps://w3id.org/dpv/risk#3RiskLevelshttps://w3id.org/dpv/risk#ConfidentialityConcept
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types dpv:RiskLevel + dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 3 Risk Levels from High to LowIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2022-08-182024-09-29
    See More: section RISK-LEVELS in RISK + section CORE in RISK
    - + - + - + - + - - @@ -5885,7 +10432,7 @@

    3 Severity Levels

    - + @@ -5898,18 +10445,15 @@

    3 Severity Levels

    - + - - - - + - @@ -5918,43 +10462,45 @@

    3 Severity Levels

    -
    -

    5 Likelihood Levels

    + + + +
    +

    Confirmation Bias

    Term3SeverityLevelsConfidentialityIncident Prefix risk
    Label3 Severity LevelsConfidentiality Incident
    IRIhttps://w3id.org/dpv/risk#3SeverityLevelshttps://w3id.org/dpv/risk#ConfidentialityIncident
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types dpv:Severity + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasSeverity + risk:hasIncident
    DefinitionScale with 3 Severity Levels from High to LowIncident where the confidentiality of information or system has been affected
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - + @@ -5963,31 +10509,34 @@

    5 Likelihood Levels

    - + - + + + + - + - + - @@ -5996,43 +10545,46 @@

    5 Likelihood Levels

    -
    -

    5 Risk Levels

    + + + +
    +

    Confounding Variables Bias

    Term5LikelihoodLevelsConfirmationBias Prefix risk
    Label5 Likelihood LevelsConfirmation Bias
    IRIhttps://w3id.org/dpv/risk#5LikelihoodLevelshttps://w3id.org/dpv/risk#ConfirmationBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Likelihood + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionScale with 5 Likelihood Levels from Very High to Very LowBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6041,31 +10593,34 @@

    5 Risk Levels

    - + - + + + + - + - + - @@ -6074,41 +10629,45 @@

    5 Risk Levels

    -
    -

    5 Severity Levels

    +
    +

    Consequence Control

    Term5RiskLevelsConfoundingVariablesBias Prefix risk
    Label5 Risk LevelsConfounding Variables Bias
    IRIhttps://w3id.org/dpv/risk#5RiskLevelshttps://w3id.org/dpv/risk#ConfoundingVariablesBias
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskLevel + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 5 Risk Levels from Very High to Very LowBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - @@ -6119,7 +10678,7 @@

    5 Severity Levels

    - + @@ -6132,7 +10691,7 @@

    5 Severity Levels

    - + @@ -6143,7 +10702,7 @@

    5 Severity Levels

    - @@ -6152,41 +10711,45 @@

    5 Severity Levels

    -
    -

    7 Likelihood Levels

    +
    +

    Containment Control

    Term5SeverityLevelsConsequenceControl Prefix risk
    Label5 Severity LevelsConsequence Control
    IRIhttps://w3id.org/dpv/risk#5SeverityLevelshttps://w3id.org/dpv/risk#ConsequenceControl
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 5 Severity Levels from Very High to Very LowRisk Mitigation Measure that controls the Consequences
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - @@ -6197,7 +10760,7 @@

    7 Likelihood Levels

    - + @@ -6210,18 +10773,15 @@

    7 Likelihood Levels

    - + - - - - + - @@ -6230,43 +10790,49 @@

    7 Likelihood Levels

    -
    -

    7 Risk Levels

    + + +
    +

    Copyright Violation

    Term7LikelihoodLevelsContainmentControl Prefix risk
    Label7 Likelihood LevelsContainment Control
    IRIhttps://w3id.org/dpv/risk#7LikelihoodLevelshttps://w3id.org/dpv/risk#ContainmentControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionScale with 7 Likelihood Levels from Extremely High to Extremely LowControl to contain event
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - + + - - - - + @@ -6275,22 +10841,28 @@

    7 Risk Levels

    - + - + + + + - + - + + + + @@ -6299,52 +10871,58 @@

    7 Risk Levels

    -
    Term7RiskLevelsCopyrightViolation Prefix risk
    Label7 Risk LevelsCopyright Violation
    IRIhttps://w3id.org/dpv/risk#7RiskLevelshttps://w3id.org/dpv/risk#CopyrightViolation
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types dpv:RiskLevel + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionScale with 7 Risk Levels from Extremely High to Extremely LowConcept representing Copyright Violation
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    + + -
    -

    7 Severity Levels

    + + + +
    +

    Coverage Bias

    - + - + - + - + - - - - - + @@ -6353,31 +10931,34 @@

    7 Severity Levels

    - + - + + + + - + - + - @@ -6385,23 +10966,23 @@

    7 Severity Levels

    -
    -

    Accidental Incident

    +
    +

    Cross-Border Incident

    Term7SeverityLevelsCoverageBias Prefix risk
    Label7 Severity LevelsCoverage Bias
    IRIhttps://w3id.org/dpv/risk#7SeverityLevelshttps://w3id.org/dpv/risk#CoverageBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:Severity + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionScale with 7 Severity Levels from Extremely High to Extremely LowBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -6431,7 +11012,7 @@

    Accidental Incident

    - + @@ -6464,36 +11045,37 @@

    Accidental Incident

    -
    -

    Accidental Misuse

    +
    +

    Cryptojacking

    TermAccidentalIncidentCrossBorderIncident Prefix risk
    LabelAccidental IncidentCross-Border Incident
    IRIhttps://w3id.org/dpv/risk#AccidentalIncidenthttps://w3id.org/dpv/risk#CrossBorderIncident
    DefinitionIncident caused due to accidental actions arising from human or human-controlled situationsIncident involving cross-border or multiple jurisdictions
    - + - + - + - + - @@ -6507,20 +11089,32 @@

    Accidental Misuse

    - + - + + + + - - - + + + + + + + + + + + + @@ -6537,40 +11131,36 @@

    Accidental Misuse

    -
    -

    Age Discrimination

    +
    +

    Customer Support Limited

    TermAccidentalMisuseCryptojacking Prefix risk
    LabelAccidental MisuseCryptojacking
    IRIhttps://w3id.org/dpv/risk#AccidentalMisusehttps://w3id.org/dpv/risk#Cryptojacking
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Misuse - → risk:UserRisks + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionAccidental MisuseConcept representing Cryptojacking
    SourceENISA Threat Landscape 2021
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - @@ -6584,7 +11174,7 @@

    Age Discrimination

    - + @@ -6597,7 +11187,7 @@

    Age Discrimination

    - + @@ -6617,36 +11207,36 @@

    Age Discrimination

    - -
    -

    Authorisation Failure

    +
    +

    Damage

    TermAgeDiscriminationCustomerSupportLimited Prefix risk
    LabelAge DiscriminationCustomer Support Limited
    IRIhttps://w3id.org/dpv/risk#AgeDiscriminationhttps://w3id.org/dpv/risk#CustomerSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's age, often impacting older or younger individualsConcept representing customer support to be limited
    Date Created2024-09-302024-10-21
    - + - + - + - + - @@ -6660,23 +11250,20 @@

    Authorisation Failure

    - + - - - - + - + @@ -6702,38 +11289,37 @@

    Authorisation Failure

    - -
    -

    None

    +
    +

    Data Aggregation Bias

    TermAuthorisationFailureDamage Prefix risk
    LabelAuthorisation FailureDamage
    IRIhttps://w3id.org/dpv/risk#AuthorisationFailurehttps://w3id.org/dpv/risk#Damage
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Authorisation FailureConcept representing Damage
    SourceENISa Trust Services Security Incidents 2021
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -6745,19 +11331,31 @@

    None

    - + + + + - + + + + - + + + + - + + + + @@ -6770,35 +11368,41 @@

    None

    -
    -

    Availability Concept

    + + + + +
    +

    Data Bias

    TermAvailabilityBreachDataAggregationBias Prefix risk
    LabelNoneData Aggregation Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityBreachhttps://w3id.org/dpv/risk#DataAggregationBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -6811,34 +11415,34 @@

    Availability Concept

    - + - - - - + - + + + + - + - + - @@ -6846,44 +11450,49 @@

    Availability Concept

    -
    -

    Availability Incident

    + + + + + + + +
    +

    Data Breach

    TermAvailabilityConceptDataBias Prefix risk
    LabelAvailability ConceptData Bias
    IRIhttps://w3id.org/dpv/risk#AvailabilityConcepthttps://w3id.org/dpv/risk#DataBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Availability' in CIA InfoSec modelBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
    Usage NoteThis concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact
    Source
    Date Created2024-09-292024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -6892,28 +11501,40 @@

    Availability Incident

    - + + + + - + + + + - + - - + + + + + + + + - @@ -6922,48 +11543,45 @@

    Availability Incident

    -
    -

    Avoid Source

    + + + + +
    +

    Data Corruption

    TermAvailabilityIncidentDataBreach Prefix risk
    LabelAvailability IncidentData Breach
    IRIhttps://w3id.org/dpv/risk#AvailabilityIncidenthttps://w3id.org/dpv/risk#DataBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the availability of information or system has been affectedConcept representing Data Breach
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in DEX
    - + - + - + - + - - - - - + @@ -6972,22 +11590,31 @@

    Avoid Source

    - + - + + + + - + + + + - + - + + + + @@ -6996,7 +11623,7 @@

    Avoid Source

    - @@ -7008,37 +11635,37 @@

    Avoid Source

    -
    -

    Benefit

    +
    +

    Data Processing Bias

    TermAvoidSourceDataCorruption Prefix risk
    LabelAvoid SourceData Corruption
    IRIhttps://w3id.org/dpv/risk#AvoidSourcehttps://w3id.org/dpv/risk#DataCorruption
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that avoids the risk sourceConcept representing Corruption of Data
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7052,28 +11679,28 @@

    Benefit

    - + - + + + + - + - - - - + - + @@ -7091,35 +11718,37 @@

    Benefit

    -
    -

    Bias

    +
    +

    Delayed Application Processing

    TermBenefitDataProcessingBias Prefix risk
    LabelBenefitData Processing Bias
    IRIhttps://w3id.org/dpv/risk#Benefithttps://w3id.org/dpv/risk#DataProcessingBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:Compensation - → risk:Renumeration - → risk:FinancialImpact + risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes benefitsBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel PolleresDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7132,34 +11761,28 @@

    Bias

    - + - - - - + - + - - - - + - @@ -7167,46 +11790,44 @@

    Bias

    - - - - - -
    -

    Blackmail

    +
    +

    Deliberate Incident

    TermBiasDelayedApplicationProcessing Prefix risk
    LabelBiasDelayed Application Processing
    IRIhttps://w3id.org/dpv/risk#Biashttps://w3id.org/dpv/risk#DelayedApplicationProcessing
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to othersConcept representing delayed processing of applications
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -7215,37 +11836,28 @@

    Blackmail

    - + - - - - + - + - - - - - - - - + + - @@ -7257,37 +11869,37 @@

    Blackmail

    - -
    -

    Brute Force Authorisations

    +
    +

    Denial of Service Attack (DoS)

    TermBlackmailDeliberateIncident Prefix risk
    LabelBlackmailDeliberate Incident
    IRIhttps://w3id.org/dpv/risk#Blackmailhttps://w3id.org/dpv/risk#DeliberateIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes BlackmailIncident caused due to deliberate actions of a human
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + @@ -7301,7 +11913,7 @@

    Brute Force Authorisations

    - + @@ -7310,7 +11922,7 @@

    Brute Force Authorisations

    - + @@ -7340,48 +11952,47 @@

    Brute Force Authorisations

    - - - -
    -

    Caste Discrimination

    +
    +

    Detection Control

    TermBruteForceAuthorisationsDenialServiceAttack Prefix risk
    LabelBrute Force AuthorisationsDenial of Service Attack (DoS)
    IRIhttps://w3id.org/dpv/risk#BruteForceAuthorisationshttps://w3id.org/dpv/risk#DenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniquesConcept representing Denial of Service Attack (DoS)
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - - - - + + + + @@ -7390,7 +12001,7 @@

    Caste Discrimination

    - + @@ -7403,7 +12014,7 @@

    Caste Discrimination

    - + @@ -7411,7 +12022,7 @@

    Caste Discrimination

    - @@ -7423,49 +12034,41 @@

    Caste Discrimination

    - -
    -

    Change Consequence

    +
    +

    Detriment

    TermCasteDiscriminationDetectionControl Prefix risk
    LabelCaste DiscriminationDetection Control
    IRIhttps://w3id.org/dpv/risk#CasteDiscriminationhttps://w3id.org/dpv/risk#DetectionControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination based on a person's caste, a form of social stratification found in some culturesControl to detect event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - + @@ -7474,7 +12077,7 @@

    Change Consequence

    - + @@ -7487,18 +12090,21 @@

    Change Consequence

    - + - + + + + - + - @@ -7507,48 +12113,44 @@

    Change Consequence

    -
    -

    Change Impact

    + + + +
    +

    Direct Discrimination

    TermChangeConsequenceDetriment Prefix risk
    LabelChange ConsequenceDetriment
    IRIhttps://w3id.org/dpv/risk#ChangeConsequencehttps://w3id.org/dpv/risk#Detriment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ConsequenceConcept representing Detriment
    Date Created2024-05-192022-03-23
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -7557,7 +12159,7 @@

    Change Impact

    - + @@ -7570,18 +12172,15 @@

    Change Impact

    - + - - - - + - @@ -7593,37 +12192,36 @@

    Change Impact

    - -
    -

    Coercion

    +
    +

    Disability Discrimination

    TermChangeImpactDirectDiscrimination Prefix risk
    LabelChange ImpactDirect Discrimination
    IRIhttps://w3id.org/dpv/risk#ChangeImpacthttps://w3id.org/dpv/risk#DirectDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that changes ImpactOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)
    Date Created2024-05-192024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -7637,32 +12235,23 @@

    Coercion

    - + - - - - + - + - - - - - - - - + + @@ -7679,36 +12268,36 @@

    Coercion

    -
    -

    Cognitive Bias

    +
    +

    Discrimination

    TermCoercionDisabilityDiscrimination Prefix risk
    LabelCoercionDisability Discrimination
    IRIhttps://w3id.org/dpv/risk#Coercionhttps://w3id.org/dpv/risk#DisabilityDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes CoercionDiscrimination against individuals based on physical or mental disabilities
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7721,34 +12310,31 @@

    Cognitive Bias

    - + - - - - + - + - + - @@ -7760,23 +12346,23 @@

    Cognitive Bias

    -
    -

    Compensation

    +
    +

    Disproportionate Energy Consumption

    TermCognitiveBiasDiscrimination Prefix risk
    LabelCognitive BiasDiscrimination
    IRIhttps://w3id.org/dpv/risk#CognitiveBiashttps://w3id.org/dpv/risk#Discrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when humans are processing and interpreting informationDiscrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditGeorg P. Krog
    See More: section RISK-TAXONOMY in AI + section RISK-TAXONOMY in RISK
    - + - + - + @@ -7788,9 +12374,7 @@

    Compensation

    - @@ -7803,7 +12387,7 @@

    Compensation

    - + @@ -7816,16 +12400,10 @@

    Compensation

    - + - - - - - - - - + + @@ -7842,36 +12420,38 @@

    Compensation

    - -
    -

    Component Failure

    +
    +

    Distributed Denial of Service Attack (DDoS)

    TermCompensationDisproportionateEnergyConsumption Prefix risk
    LabelCompensationDisproportionate Energy Consumption
    IRIhttps://w3id.org/dpv/risk#Compensationhttps://w3id.org/dpv/risk#DisproportionateEnergyConsumption
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or provides compensation - which can be monetary and financial or in other formsThe occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised
    Date Created2024-04-142024-10-21
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + - + - @@ -7885,23 +12465,32 @@

    Component Failure

    - + - - - - + - + + + + - - - + + + + + + + + + + + + @@ -7918,37 +12507,35 @@

    Component Failure

    - -
    -

    Component Malfunction

    +
    +

    Earthquake

    TermComponentFailureDistributedDenialServiceAttack Prefix risk
    LabelComponent FailureDistributed Denial of Service Attack (DDoS)
    IRIhttps://w3id.org/dpv/risk#ComponentFailurehttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk + risk:DenialServiceAttack + → risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Component FailureConcept representing Distributed Denial of Service Attack (DDoS)
    Usage NoteHere component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -7961,12 +12548,9 @@

    Component Malfunction

    - + - - - - + @@ -7975,7 +12559,10 @@

    Component Malfunction

    - + + + + @@ -7990,47 +12577,44 @@

    Component Malfunction

    - - - - - - - -
    -

    Compromise Account

    +
    +

    Environmental Incident

    TermComponentMalfunctionEarthquake Prefix risk
    LabelComponent MalfunctionEarthquake
    IRIhttps://w3id.org/dpv/risk#ComponentMalfunctionhttps://w3id.org/dpv/risk#Earthquake
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes Component MalfunctionThe occurence or potential occurence of earthquakes
    Usage NoteHere component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of
    Date Created2024-10-21
    - + - + - + - + - - + + + + @@ -8039,37 +12623,28 @@

    Compromise Account

    - + - - - - + - + - - - - - - - - + + - @@ -8081,36 +12656,35 @@

    Compromise Account

    - -
    -

    Compromise Account Credentials

    +
    +

    Environmental Risk

    TermCompromiseAccountEnvironmentalIncident Prefix risk
    LabelCompromise AccountEnvironmental Incident
    IRIhttps://w3id.org/dpv/risk#CompromiseAccounthttps://w3id.org/dpv/risk#EnvironmentalIncident
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:ExternalSecurityThreat + risk:Incident → dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionSomething that acts as or causes a compromised account that is then used by the compromiserIncident caused due to environmental factors outside human controls
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - @@ -8124,32 +12698,23 @@

    Compromise Account Credentials

    - + - - - - + - + - - - - - - - - + + @@ -8167,37 +12732,36 @@

    Compromise Account Credentials

    -
    -

    Confidentiality Breach

    +
    +

    Equipment Failure

    TermCompromiseAccountCredentialsEnvironmentalRisk Prefix risk
    LabelCompromise Account CredentialsEnvironmental Risk
    IRIhttps://w3id.org/dpv/risk#CompromiseAccountCredentialshttps://w3id.org/dpv/risk#EnvironmentalRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Account Credentials to be compromisedRisks and issues that have their origin in environment or can affect the environment at large
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -8211,9 +12775,12 @@

    Confidentiality Breach

    - + - + + + + @@ -8249,35 +12816,42 @@

    Confidentiality Breach

    -
    -

    Confidentiality Concept

    + + + + + +
    +

    Equipment Malfunction

    TermConfidentialityBreachEquipmentFailure Prefix risk
    LabelConfidentiality BreachEquipment Failure
    IRIhttps://w3id.org/dpv/risk#ConfidentialityBreachhttps://w3id.org/dpv/risk#EquipmentFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Confidentiality BreachConcept representing Equipment Failure
    Usage NoteHere equipment refers to physical equipment
    - + - + - + - + - @@ -8290,25 +12864,31 @@

    Confidentiality Concept

    - + - + - + + + + - + - + + + + @@ -8317,7 +12897,7 @@

    Confidentiality Concept

    - @@ -8325,44 +12905,45 @@

    Confidentiality Concept

    -
    -

    Confidentiality Incident

    + + + + +
    +

    Erroneous Use

    TermConfidentialityConceptEquipmentMalfunction Prefix risk
    LabelConfidentiality ConceptEquipment Malfunction
    IRIhttps://w3id.org/dpv/risk#ConfidentialityConcepthttps://w3id.org/dpv/risk#EquipmentMalfunction
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Confidentiality' in CIA InfoSec modelConcept representing Equipment Malfunction
    Usage NoteThis concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impactHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8371,28 +12952,37 @@

    Confidentiality Incident

    - + - + + + + - + - - + + + + + + + + - @@ -8404,37 +12994,38 @@

    Confidentiality Incident

    -
    -

    Confirmation Bias

    +
    +

    Ethnic Discrimination

    TermConfidentialityIncidentErroneousUse Prefix risk
    LabelConfidentiality IncidentErroneous Use
    IRIhttps://w3id.org/dpv/risk#ConfidentialityIncidenthttps://w3id.org/dpv/risk#ErroneousUse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident where the confidentiality of information or system has been affectedConcept representing erroneous use (of something)
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8447,29 +13038,23 @@

    Confirmation Bias

    - + - - - - + - + - - - - + @@ -8486,38 +13071,37 @@

    Confirmation Bias

    -
    -

    Confounding Variables Bias

    +
    +

    Excellence Discrimination

    TermConfirmationBiasEthnicDiscrimination Prefix risk
    LabelConfirmation BiasEthnic Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfirmationBiashttps://w3id.org/dpv/risk#EthnicDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of informationDiscrimination against individuals based on their ethnicity or cultural heritage
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -8530,29 +13114,23 @@

    Confounding Variables Bias

    - + - - - - + - + - - - - + @@ -8566,47 +13144,46 @@

    Confounding Variables Bias

    -
    -

    Consequence Control

    + + + + + +
    +

    Exposure to Harmful Speech

    TermConfoundingVariablesBiasExcellenceDiscrimination Prefix risk
    LabelConfounding Variables BiasExcellence Discrimination
    IRIhttps://w3id.org/dpv/risk#ConfoundingVariablesBiashttps://w3id.org/dpv/risk#ExcellenceDiscrimination
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious associationFavoritism towards individuals deemed more competent or superior, often at the expense of others
    Source
    Date Created2024-09-132024-09-30
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -8615,22 +13192,31 @@

    Consequence Control

    - + - + + + + - + + + + - + - + + + + @@ -8639,7 +13225,7 @@

    Consequence Control

    - @@ -8648,47 +13234,41 @@

    Consequence Control

    -
    -

    Containment Control

    + +
    +

    External Security Threat

    TermConsequenceControlExposureToHarmfulSpeech Prefix risk
    LabelConsequence ControlExposure to Harmful Speech
    IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that controls the ConsequencesConcept representing Harmful Speech
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -8697,7 +13277,7 @@

    Containment Control

    - + @@ -8708,17 +13288,14 @@

    Containment Control

    - - - - + - @@ -8729,35 +13306,40 @@

    Containment Control

    -
    -

    Copyright Violation

    + + +
    +

    Extorsion

    TermContainmentControlExternalSecurityThreat Prefix risk
    LabelContainment ControlExternal Security Threat
    IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ExternalSecurityThreat
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSource
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to contain eventConcepts associated with security threats that are likely to originate externally
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -8770,7 +13352,7 @@

    Copyright Violation

    - + @@ -8779,7 +13361,7 @@

    Copyright Violation

    - + @@ -8806,51 +13388,47 @@

    Copyright Violation

    TermCopyrightViolationExtorsion Prefix risk
    LabelCopyright ViolationExtorsion
    IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#Extorsion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ViolatingObligation + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Copyright ViolationConcept representing Extorsion
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - - - - - -
    -

    Coverage Bias

    +
    +

    Extremely High Likelihood

    - + - + - + - + - - + + + + @@ -8859,34 +13437,34 @@

    Coverage Bias

    - + - + + + + - - - - + - + - + - @@ -8894,42 +13472,43 @@

    Coverage Bias

    -
    -

    Cross-Border Incident

    + +
    +

    Extremely High Risk

    TermCoverageBiasExtremelyHighLikelihood Prefix risk
    LabelCoverage BiasExtremely High Likelihood
    IRIhttps://w3id.org/dpv/risk#CoverageBiashttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionBias that occurs when a population represented in a dataset does not match the actual or real population that are being usedLevel where Likelihood is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - @@ -8940,9 +13519,12 @@

    Cross-Border Incident

    - + - + + + + @@ -8953,15 +13535,18 @@

    Cross-Border Incident

    - + - + + + + - @@ -8970,44 +13555,44 @@

    Cross-Border Incident

    - - - -
    -

    Cryptojacking

    +
    +

    Extremely High Severity

    TermCrossBorderIncidentExtremelyHighRisk Prefix risk
    LabelCross-Border IncidentExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation risk:hasIncident + dpv:hasRiskLevel
    DefinitionIncident involving cross-border or multiple jurisdictionsLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9016,28 +13601,25 @@

    Cryptojacking

    - + - + + + + - - - - + - + - - - - + @@ -9046,7 +13628,7 @@

    Cryptojacking

    - @@ -9055,43 +13637,44 @@

    Cryptojacking

    - - - -
    -

    Damage

    +
    +

    Extremely Low Likelihood

    TermCryptojackingExtremelyHighSeverity Prefix risk
    LabelCryptojackingExtremely High Severity
    IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#ExtremelyHighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes CryptojackingLevel where Severity is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    SourceENISA Threat Landscape 2021
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9100,9 +13683,12 @@

    Damage

    - + - + + + + @@ -9113,12 +13699,9 @@

    Damage

    - + - - - - + @@ -9127,7 +13710,7 @@

    Damage

    - @@ -9136,44 +13719,44 @@

    Damage

    - - - -
    -

    Data Aggregation Bias

    +
    +

    Extremely Low Risk

    TermDamageExtremelyLowLikelihood Prefix risk
    LabelDamageExtremely Low Likelihood
    IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes DamageLevel where Likelihood is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-03-302022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9182,34 +13765,34 @@

    Data Aggregation Bias

    - + - + + + + - - - - + - + - + - @@ -9218,43 +13801,44 @@

    Data Aggregation Bias

    - - - -
    -

    Data Bias

    +
    +

    Extremely Low Severity

    TermDataAggregationBiasExtremelyLowRisk Prefix risk
    LabelData Aggregation BiasExtremely Low Risk
    IRIhttps://w3id.org/dpv/risk#DataAggregationBiashttps://w3id.org/dpv/risk#ExtremelyLowRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionBias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the dataLevel where Risk is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - + + + + @@ -9263,34 +13847,34 @@

    Data Bias

    - + - + + + + - - - - + - + - + - @@ -9302,39 +13886,35 @@

    Data Bias

    - - - -
    -

    Data Breach

    +
    +

    Financial Impact

    TermDataBiasExtremelyLowSeverity Prefix risk
    LabelData BiasExtremely Low Severity
    IRIhttps://w3id.org/dpv/risk#DataBiashttps://w3id.org/dpv/risk#ExtremelyLowSeverity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:Bias - → risk:RiskConcept + risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groupsLevel where Severity is Extremely Low
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Source
    Date Created2024-09-132022-08-18
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -9348,40 +13928,28 @@

    Data Breach

    - + - - - - - - - + - + - - - - - - - - + + - @@ -9393,36 +13961,36 @@

    Data Breach

    - -
    -

    Data Corruption

    +
    +

    Financial Loss

    TermDataBreachFinancialImpact Prefix risk
    LabelData BreachFinancial Impact
    IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#FinancialImpact
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Data BreachThings that cause or have the potential to impact financial resources
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9436,12 +14004,9 @@

    Data Corruption

    - + - - - - + @@ -9481,37 +14046,35 @@

    Data Corruption

    -
    -

    Data Processing Bias

    +
    +

    Floods

    TermDataCorruptionFinancialLoss Prefix risk
    LabelData CorruptionFinancial Loss
    IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#FinancialLoss
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:FinancialImpact + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Corruption of DataConcept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
    Usage NoteThis concept was called "Corruption Data" in DPV 2.0
    - + - + - + - + - @@ -9524,29 +14087,23 @@

    Data Processing Bias

    - + - - - - + - + - - - - + @@ -9559,44 +14116,47 @@

    Data Processing Bias

    -
    -

    Deliberate Incident

    + + + + + +
    +

    Fraud

    TermDataProcessingBiasFloods Prefix risk
    LabelData Processing BiasFloods
    IRIhttps://w3id.org/dpv/risk#DataProcessingBiashttps://w3id.org/dpv/risk#Floods
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any biasThe occurence or potential occurence of floods
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9605,28 +14165,37 @@

    Deliberate Incident

    - + - + + + + - + - - + + + + + + + + - @@ -9638,36 +14207,37 @@

    Deliberate Incident

    -
    -

    Denial of Service Attack (DoS)

    +
    +

    Gender Discrimination

    TermDeliberateIncidentFraud Prefix risk
    LabelDeliberate IncidentFraud
    IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Fraud
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Incident + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    Object of relation risk:hasIncident -
    DefinitionIncident caused due to deliberate actions of a humanConcept representing Fraud
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9681,32 +14251,23 @@

    Denial of Service Attack (DoS)

    - + - - - - + - + - - - - - - - - + + @@ -9720,47 +14281,44 @@

    Denial of Service Attack (DoS)

    -
    -

    Detection Control

    + + + +
    +

    Geographic Discrimination

    TermDenialServiceAttackGenderDiscrimination Prefix risk
    LabelDenial of Service Attack (DoS)Gender Discrimination
    IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#GenderDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Discrimination based on a person's gender identity or gender expression
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - - + @@ -9769,7 +14327,7 @@

    Detection Control

    - + @@ -9782,7 +14340,7 @@

    Detection Control

    - + @@ -9790,7 +14348,7 @@

    Detection Control

    - @@ -9801,35 +14359,38 @@

    Detection Control

    -
    -

    Detriment

    + +
    +

    Group Attribution Bias

    TermDetectionControlGeographicDiscrimination Prefix risk
    LabelDetection ControlGeographic Discrimination
    IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#GeographicDiscrimination
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to detect eventDiscrimination based on a person's geographical origin or residence
    Date Created2024-05-192024-09-30
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -9843,28 +14404,28 @@

    Detriment

    - + - + + + + - + - - - - + - + @@ -9882,40 +14443,35 @@

    Detriment

    -
    -

    Direct Discrimination

    +
    +

    Societal Risk

    TermDetrimentGroupAttributionBias Prefix risk
    LabelDetrimentGroup Attribution Bias
    IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#GroupAttributionBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes DetrimentBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
    Source
    Date Created2022-03-232024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -9929,7 +14485,7 @@

    Direct Discrimination

    - + @@ -9940,10 +14496,7 @@

    Direct Discrimination

    - - - - + @@ -9959,48 +14512,48 @@

    Direct Discrimination

    - - - -
    -

    Disability Discrimination

    +
    +

    Halt Source

    TermDirectDiscriminationGroupRisk Prefix risk
    LabelDirect DiscriminationSocietal Risk
    IRIhttps://w3id.org/dpv/risk#DirectDiscriminationhttps://w3id.org/dpv/risk#GroupRisk
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)Risks and issues that affect or have the potential to affect groups in society
    Date Created2024-09-30
    - + - + - + - + - - - - + + + + @@ -10009,7 +14562,7 @@

    Disability Discrimination

    - + @@ -10022,15 +14575,18 @@

    Disability Discrimination

    - + - + + + + - @@ -10042,39 +14598,37 @@

    Disability Discrimination

    - -
    -

    Discrimination

    +
    +

    Harassment

    TermDisabilityDiscriminationHaltSource Prefix risk
    LabelDisability DiscriminationHalt Source
    IRIhttps://w3id.org/dpv/risk#DisabilityDiscriminationhttps://w3id.org/dpv/risk#HaltSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on physical or mental disabilitiesControl that halts the risk source or prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10086,10 +14640,7 @@

    Discrimination

    - - - - + @@ -10099,18 +14650,9 @@

    Discrimination

    - - - - - - - - - - - - + + + @@ -10127,37 +14669,36 @@

    Discrimination

    -
    -

    Distributed Denial of Service Attack (DDoS)

    +
    +

    Harm

    TermDiscriminationHarassment Prefix risk
    LabelDiscriminationHarassment
    IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#Harassment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskConcept -
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Definition[rdflib.term.Literal('Something that acts as or causes Discrimination', lang='en'), rdflib.term.Literal('Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate', lang='en')]
    Date Created2024-09-30
    Date Modified2024-08-16
    ContributorsGeorg P. Krog
    - + - + - + - + - @@ -10171,23 +14712,23 @@

    Distributed Denial of Service Attack (DDoS)

    - + - + + + + - - - - + - + @@ -10209,42 +14750,61 @@

    Distributed Denial of Service Attack (DDoS)

    -
    -

    Environmental Incident

    + + + + + + + + + + + +
    +

    High Likelihood

    TermDistributedDenialServiceAttackHarm Prefix risk
    LabelDistributed Denial of Service Attack (DDoS)Harm
    IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#Harm
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DenialServiceAttack - → risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Concept representing Harm to humans
    Usage NoteThis concept refers to the general abstract notion of harm
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-13
    Date Modified
    - + - + - + - + - + + + + - @@ -10255,9 +14815,12 @@

    Environmental Incident

    - + - + + + + @@ -10268,15 +14831,18 @@

    Environmental Incident

    - + - + + + + - @@ -10285,42 +14851,52 @@

    Environmental Incident

    - - - -
    -

    Environmental Risk

    +
    +

    High Risk

    TermEnvironmentalIncidentHighLikelihood Prefix risk
    LabelEnvironmental IncidentHigh Likelihood
    IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#HighLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident caused due to environmental factors outside human controlsLevel where Likelihood is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10329,9 +14905,12 @@

    Environmental Risk

    - + - + + + + @@ -10340,14 +14919,20 @@

    Environmental Risk

    - + + + + - + + + + - @@ -10356,44 +14941,52 @@

    Environmental Risk

    - - - - -
    -

    Equipment Failure

    +
    +

    High Severity

    TermEnvironmentalRiskHighRisk Prefix risk
    LabelEnvironmental RiskHigh Risk
    IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#HighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionRisks and issues that have their origin in environment or can affect the environment at largeLevel where Risk is High
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -10402,31 +14995,25 @@

    Equipment Failure

    - + - + - - - - + - + - - - - + @@ -10435,7 +15022,7 @@

    Equipment Failure

    - @@ -10447,36 +15034,37 @@

    Equipment Failure

    - -
    -

    Equipment Malfunction

    +
    +

    Homophobia

    TermEquipmentFailureHighSeverity Prefix risk
    LabelEquipment FailureHigh Severity
    IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#HighSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Equipment FailureLevel where Severity is High
    Usage NoteHere equipment refers to physical equipmentThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - @@ -10490,35 +15078,23 @@

    Equipment Malfunction

    - + - - - - + - - - - + - + - - - - - - - - + + @@ -10535,23 +15111,23 @@

    Equipment Malfunction

    -
    -

    Erroneous System Use

    +
    +

    Human Errors

    TermEquipmentMalfunctionHomophobia Prefix risk
    LabelEquipment MalfunctionHomophobia
    IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Homophobia
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:SexualOrientationDiscrimination + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Equipment MalfunctionHostility or prejudice against individuals who are or are perceived to be homosexual
    Usage NoteHere equipment refers to physical equipment
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -10564,6 +15140,7 @@

    Erroneous System Use

    @@ -10577,7 +15154,7 @@

    Erroneous System Use

    - + @@ -10586,7 +15163,7 @@

    Erroneous System Use

    - + @@ -10616,50 +15193,47 @@

    Erroneous System Use

    - - - -
    -

    Ethnic Discrimination

    +
    +

    Identification Control

    TermErroneousSystemUseHumanErrors Prefix risk
    LabelErroneous System UseHuman Errors
    IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#HumanErrors
    Broader/Parent types risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Erroneous System UseConcept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - - - - + + + + @@ -10668,7 +15242,7 @@

    Ethnic Discrimination

    - + @@ -10681,7 +15255,7 @@

    Ethnic Discrimination

    - + @@ -10689,7 +15263,7 @@

    Ethnic Discrimination

    - @@ -10701,40 +15275,38 @@

    Ethnic Discrimination

    -
    -

    Excellence Discrimination

    + +
    +

    Identity Fraud

    TermEthnicDiscriminationIdentificationControl Prefix risk
    LabelEthnic DiscriminationIdentification Control
    IRIhttps://w3id.org/dpv/risk#EthnicDiscriminationhttps://w3id.org/dpv/risk#IdentificationControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals based on their ethnicity or cultural heritageControl to identify characteristics of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - @@ -10748,23 +15320,32 @@

    Excellence Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -10782,36 +15363,37 @@

    Excellence Discrimination

    - -
    -

    Exposure to Harmful Speech

    +
    +

    Identity Theft

    TermExcellenceDiscriminationIdentityFraud Prefix risk
    LabelExcellence DiscriminationIdentity Fraud
    IRIhttps://w3id.org/dpv/risk#ExcellenceDiscriminationhttps://w3id.org/dpv/risk#IdentityFraud
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionFavoritism towards individuals deemed more competent or superior, often at the expense of othersConcept representing Identity Fraud
    SourceENISA Threat Taxonomy 2016
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -10825,19 +15407,16 @@

    Exposure to Harmful Speech

    - + - - - - + - + @@ -10868,35 +15447,39 @@

    Exposure to Harmful Speech

    -
    -

    External Security Threat

    + + +
    +

    Identity Verification Failure

    TermExposureToHarmfulSpeechIdentityTheft Prefix risk
    LabelExposure to Harmful SpeechIdentity Theft
    IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#IdentityTheft
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SocietalRisk + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Harmful SpeechConcept representing Identity Theft
    Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
    SourceENISA Reference Incident Classification Taxonomy 2018ENISA Threat Taxonomy 2016
    - + - + - + - + - @@ -10909,7 +15492,7 @@

    External Security Threat

    - + @@ -10920,7 +15503,10 @@

    External Security Threat

    - + + + + @@ -10938,38 +15524,36 @@

    External Security Threat

    - - -
    -

    Extorsion

    +
    +

    Illegal Data Processing

    TermExternalSecurityThreatIdentityVerificationFailure Prefix risk
    LabelExternal Security ThreatIdentity Verification Failure
    IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#IdentityVerificationFailure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcepts associated with security threats that are likely to originate externallyConcept representing failure to verify identity
    Date Created2024-10-21
    - + - + - + - + - @@ -10983,16 +15567,19 @@

    Extorsion

    - + - + + + + - + @@ -11022,42 +15609,45 @@

    Extorsion

    -
    -

    Extremely High Likelihood

    +
    +

    Impact Control

    TermExtorsionIllegalDataProcessing Prefix risk
    LabelExtorsionIllegal Data Processing
    IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#IllegalDataProcessing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ExtorsionConcept representing Illegal Processing of Data
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceENISA Threat Taxonomy 2016ISO/IEC 27005:2018
    - + - + - + - + - - @@ -11068,12 +15658,9 @@

    Extremely High Likelihood

    - + - - - - + @@ -11084,7 +15671,7 @@

    Extremely High Likelihood

    - + @@ -11095,7 +15682,7 @@

    Extremely High Likelihood

    - @@ -11104,126 +15691,45 @@

    Extremely High Likelihood

    -
    -

    Extremely High Risk

    -
    TermExtremelyHighLikelihoodImpactControl Prefix risk
    LabelExtremely High LikelihoodImpact Control
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#ImpactControl
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is Extremely HighRisk Mitigation Measure that controls Impacts
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    TermExtremelyHighRiskPrefixrisk
    LabelExtremely High Risk
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely High
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK -
    -
    -
    -

    Extremely High Severity

    +
    +

    Implicit Bias

    - + - + - + - + - - - - - + @@ -11232,34 +15738,34 @@

    Extremely High Severity

    - + - - - - + - + + + + - + - + - @@ -11268,44 +15774,44 @@

    Extremely High Severity

    -
    -

    Extremely Low Likelihood

    + + + +
    +

    Inability to Enter Into Contract

    TermExtremelyHighSeverityImplicitBias Prefix risk
    LabelExtremely High SeverityImplicit Bias
    IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ImplicitBias
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely HighBias that occurs when a human makes an association or assumption based on their mental models and memories
    Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11314,12 +15820,9 @@

    Extremely Low Likelihood

    - + - - - - + @@ -11330,18 +15833,15 @@

    Extremely Low Likelihood

    - + - - - - + - @@ -11350,44 +15850,44 @@

    Extremely Low Likelihood

    -
    -

    Extremely Low Risk

    + + + +
    +

    Inability to Establish Legal Claims

    TermExtremelyLowLikelihoodInabilityToEnterIntoContract Prefix risk
    LabelExtremely Low LikelihoodInability to Enter Into Contract
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#InabilityToEnterIntoContract
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11396,12 +15896,9 @@

    Extremely Low Risk

    - + - - - - + @@ -11412,18 +15909,15 @@

    Extremely Low Risk

    - + - - - - + - @@ -11432,44 +15926,44 @@

    Extremely Low Risk

    -
    -

    Extremely Low Severity

    + + + +
    +

    Inability to Fulfill Legal Obligations

    TermExtremelyLowRiskInabilityToEstablishLegalClaims Prefix risk
    LabelExtremely Low RiskInability to Establish Legal Claims
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#InabilityToEstablishLegalClaims
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -11478,12 +15972,9 @@

    Extremely Low Severity

    - + - - - - + @@ -11494,18 +15985,15 @@

    Extremely Low Severity

    - + - - - - + - @@ -11517,23 +16005,23 @@

    Extremely Low Severity

    -
    -

    Financial Impact

    +
    +

    Inability to Process Payments

    TermExtremelyLowSeverityInabilityToFulfillLegalObligations Prefix risk
    LabelExtremely Low SeverityInability to Fulfill Legal Obligations
    IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#InabilityToFulfillLegalObligations
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is Extremely LowStub
    Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -11545,7 +16033,9 @@

    Financial Impact

    - @@ -11558,7 +16048,7 @@

    Financial Impact

    - + @@ -11569,7 +16059,10 @@

    Financial Impact

    - + + + + @@ -11588,23 +16081,23 @@

    Financial Impact

    -
    -

    Financial Loss

    +
    +

    Inability to Protect Vital Interests

    TermFinancialImpactInabilityToProcessPayments Prefix risk
    LabelFinancial ImpactInability to Process Payments
    IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#InabilityToProcessPayments
    Broader/Parent types dpv:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionThings that cause or have the potential to impact financial resourcesStub
    Date Created2024-10-21
    - + - + - + @@ -11616,7 +16109,8 @@

    Financial Loss

    - @@ -11630,32 +16124,23 @@

    Financial Loss

    - + - - - - + - + - - - - - - - - + + @@ -11672,37 +16157,36 @@

    Financial Loss

    - -
    -

    Fraud

    +
    +

    Inability to Provide Health Care

    TermFinancialLossInabilityToProtectVitalInterests Prefix risk
    LabelFinancial LossInability to Protect Vital Interests
    IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#InabilityToProtectVitalInterests
    Broader/Parent types risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -11716,32 +16200,23 @@

    Fraud

    - + - - - - + - + - - - - - - - - + + @@ -11754,51 +16229,43 @@

    Fraud

    - - - - -
    -

    Gender Discrimination

    +
    +

    Incident

    TermFraudInabilityToProvideHealthCare Prefix risk
    LabelFraudInability to Provide Health Care
    IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#InabilityToProvideHealthCare
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes FraudStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -11807,10 +16274,16 @@

    Gender Discrimination

    - + + + + + - + + + @@ -11820,65 +16293,73 @@

    Gender Discrimination

    - + - - + + + + + + + + -
    TermGenderDiscriminationIncident Prefix risk
    LabelGender DiscriminationIncident
    IRIhttps://w3id.org/dpv/risk#GenderDiscriminationhttps://w3id.org/dpv/risk#Incident
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasIncident +
    DefinitionDiscrimination based on a person's gender identity or gender expressionAn actual or occured event
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created2024-09-302024-02-14
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section RISK-TAXONOMY in RISK + section CORE in DEX + , section INCIDENT in DEX
    + + - - - - -
    -

    Geographic Discrimination

    +
    +

    Incident Assessment Report

    - + - + - + - + - - - - + + + + @@ -11887,7 +16368,7 @@

    Geographic Discrimination

    - + @@ -11900,7 +16381,7 @@

    Geographic Discrimination

    - + @@ -11908,7 +16389,7 @@

    Geographic Discrimination

    - @@ -11917,44 +16398,46 @@

    Geographic Discrimination

    - - - -
    -

    Group Attribution Bias

    +
    +

    Incident Concluded

    TermGeographicDiscriminationIncidentAssessmentReport Prefix risk
    LabelGeographic DiscriminationIncident Assessment Report
    IRIhttps://w3id.org/dpv/risk#GeographicDiscriminationhttps://w3id.org/dpv/risk#IncidentAssessmentReport
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionDiscrimination based on a person's geographical origin or residenceA report describing the assessment of an incident in terms of its effects or impacts
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -11963,34 +16446,31 @@

    Group Attribution Bias

    - + - - - - + - + - + - @@ -11998,47 +16478,46 @@

    Group Attribution Bias

    - -
    -

    Halt Source

    +
    +

    Incident Concluding Report

    TermGroupAttributionBiasIncidentConcluded Prefix risk
    LabelGroup Attribution BiasIncident Concluded
    IRIhttps://w3id.org/dpv/risk#GroupAttributionBiashttps://w3id.org/dpv/risk#IncidentConcluded
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that groupThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
    Source
    Date Created2024-09-132024-02-14
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - @@ -12049,7 +16528,7 @@

    Halt Source

    - + @@ -12065,15 +16544,12 @@

    Halt Source

    - - - - + - @@ -12081,51 +16557,58 @@

    Halt Source

    - - - - -
    -

    Harassment

    +
    +

    Incident Detection Report

    TermHaltSourceIncidentConcludingReport Prefix risk
    LabelHalt SourceIncident Concluding Report
    IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#IncidentConcludingReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionControl that halts the risk source or prevents it from materialisingA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + - + + + + @@ -12135,14 +16618,17 @@

    Harassment

    - + + + + - @@ -12151,42 +16637,46 @@

    Harassment

    - - - -
    -

    Harm

    +
    +

    Incident Halted

    TermHarassmentIncidentDetectionReport Prefix risk
    LabelHarassmentIncident Detection Report
    IRIhttps://w3id.org/dpv/risk#Harassmenthttps://w3id.org/dpv/risk#IncidentDetectionReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionA report describing the detection of a Incident
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12195,12 +16685,9 @@

    Harm

    - + - - - - + @@ -12211,12 +16698,9 @@

    Harm

    - + - - - - + @@ -12225,7 +16709,7 @@

    Harm

    - @@ -12233,61 +16717,46 @@

    Harm

    - - - - - - - - - - - -
    -

    High Likelihood

    +
    +

    Incident Handling Report

    TermHarmIncidentHalted Prefix risk
    LabelHarmIncident Halted
    IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentHalted
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IndividualRisk + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Harm to humansThe incident has halted or paused with a high likelihood of resuming or recurring
    Usage NoteThis concept refers to the general abstract notion of harm
    Date Created2022-08-132024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - - - - - @@ -12298,12 +16767,9 @@

    High Likelihood

    - + - - - - + @@ -12314,18 +16780,15 @@

    High Likelihood

    - + - - - - + - @@ -12333,53 +16796,36 @@

    High Likelihood

    - -
    -

    High Risk

    +
    +

    Incident Identifier

    TermHighLikelihoodIncidentHandlingReport Prefix risk
    LabelHigh LikelihoodIncident Handling Report
    IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentHandlingReport
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Likelihood is HighA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - - + - - - - + @@ -12388,12 +16834,9 @@

    High Risk

    - + - - - - + @@ -12404,18 +16847,15 @@

    High Risk

    - + - - - - + - @@ -12423,51 +16863,49 @@

    High Risk

    - -
    -

    High Severity

    +
    +

    Incident Impact Assessment

    TermHighRiskIncidentIdentifier Prefix risk
    LabelHigh RiskIncident Identifier
    IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentIdentifier
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel -
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is HighIdentifier associated with an incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - - - @@ -12478,12 +16916,9 @@

    High Severity

    - + - - - - + @@ -12494,7 +16929,7 @@

    High Severity

    - + @@ -12505,7 +16940,7 @@

    High Severity

    - @@ -12514,50 +16949,46 @@

    High Severity

    - - - -
    -

    Homophobia

    +
    +

    Incident Mitigated

    TermHighSeverityIncidentImpactAssessment Prefix risk
    LabelHigh SeverityIncident Impact Assessment
    IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentImpactAssessment
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionLevel where Severity is HighAn impact assessment associated with a incident
    Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
    - + - + - + - + - - - - + + + + @@ -12566,7 +16997,7 @@

    Homophobia

    - + @@ -12579,15 +17010,18 @@

    Homophobia

    - + - + + + + - @@ -12595,44 +17029,45 @@

    Homophobia

    - - - - -
    -

    Human Errors

    +
    +

    Incident Mitigation Measure

    TermHomophobiaIncidentMitigated Prefix risk
    LabelHomophobiaIncident Mitigated
    IRIhttps://w3id.org/dpv/risk#Homophobiahttps://w3id.org/dpv/risk#IncidentMitigated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:SexualOrientationDiscrimination - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionHostility or prejudice against individuals who are or are perceived to be homosexualThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
    Date Created2024-09-302024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12641,37 +17076,28 @@

    Human Errors

    - + - - - - + - + - - - - - - - - + + - @@ -12680,45 +17106,44 @@

    Human Errors

    -
    -

    Identification Control

    +
    +

    Incident Near Miss

    TermHumanErrorsIncidentMitigationMeasure Prefix risk
    LabelHuman ErrorsIncident Mitigation Measure
    IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentMitigationMeasure
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:UserRisks - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
    DefinitionSomething that acts as or causes Human ErrorsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -12729,7 +17154,7 @@

    Identification Control

    - + @@ -12742,15 +17167,18 @@

    Identification Control

    - + - + + + + - @@ -12758,46 +17186,47 @@

    Identification Control

    - - - - - -
    -

    Identity Fraud

    +
    +

    Incident Notice

    TermIdentificationControlIncidentNearMiss Prefix risk
    LabelIdentification ControlIncident Near Miss
    IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentNearMiss
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasContext, + dpv:hasStatus
    DefinitionControl to identify characteristics of eventThe state where an incident was almost successful in taking place i.e. "it came very close"
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12806,37 +17235,28 @@

    Identity Fraud

    - + - - - - + - + - - - - - - - - + + - @@ -12845,45 +17265,46 @@

    Identity Fraud

    - - - - -
    -

    Identity Theft

    +
    +

    Incident Ongoing

    TermIdentityFraudIncidentNotice Prefix risk
    LabelIdentity FraudIncident Notice
    IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentNotice
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:Notice + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasNotice, + dpv:hasOrganisationalMeasure, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Identity FraudNotice associated with an Incident
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -12892,28 +17313,22 @@

    Identity Theft

    - + - - - - + - + - - - - + @@ -12922,7 +17337,7 @@

    Identity Theft

    - @@ -12930,43 +17345,48 @@

    Identity Theft

    - - - -
    -

    Illegal Data Processing

    +
    +

    Incident Ongoing Report

    TermIdentityTheftIncidentOngoing Prefix risk
    LabelIdentity TheftIncident Ongoing
    IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentOngoing
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasContext, + dpv:hasStatus +
    DefinitionSomething that acts as or causes Identity TheftThe incident is ongoing i.e. still active
    SourceENISA Threat Taxonomy 2016
    Date Created2022-08-172024-02-14
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT-STATUS in RISK
    - + - + - + - + - - + + + + @@ -12975,40 +17395,28 @@

    Illegal Data Processing

    - + - - - - + - - - - + - + - - - - - - - - + + - @@ -13016,46 +17424,46 @@

    Illegal Data Processing

    - -
    -

    Impact Control

    +
    +

    Incident Preliminary Report

    TermIllegalDataProcessingIncidentOngoingReport Prefix risk
    LabelIllegal Data ProcessingIncident Ongoing Report
    IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentOngoingReport
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionSomething that acts as or causes Illegal Processing of DataA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
    Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + - + - - @@ -13066,7 +17474,7 @@

    Impact Control

    - + @@ -13082,15 +17490,12 @@

    Impact Control

    - - - - + - @@ -13098,45 +17503,47 @@

    Impact Control

    - - - - -
    -

    Implicit Bias

    +
    +

    Incident Register

    TermImpactControlIncidentPreliminaryReport Prefix risk
    LabelImpact ControlIncident Preliminary Report
    IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentPreliminaryReport
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionRisk Mitigation Measure that controls ImpactsA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
    - + - + - + - + - - + + + + @@ -13145,34 +17552,31 @@

    Implicit Bias

    - + - - - - + - + - + - @@ -13180,23 +17584,23 @@

    Implicit Bias

    -
    -

    Incident

    +
    +

    Incident Report

    TermImplicitBiasIncidentRegister Prefix risk
    LabelImplicit BiasIncident Register
    IRIhttps://w3id.org/dpv/risk#ImplicitBiashttps://w3id.org/dpv/risk#IncidentRegister
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
    DefinitionBias that occurs when a human makes an association or assumption based on their mental models and memoriesA register recording incidentes, their reports, notifications, and other related activities
    Source
    Date Created2024-09-132024-05-19
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section INCIDENT in RISK
    - + - + - + @@ -13208,13 +17612,17 @@

    Incident

    - - @@ -13225,16 +17633,10 @@

    Incident

    - + - - - - - - - + @@ -13246,46 +17648,37 @@

    Incident

    - - - - - - - - + + -
    TermIncidentIncidentReport Prefix risk
    LabelIncidentIncident Report
    IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentReport
    Broader/Parent types dpv:RiskConcept + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation risk:hasIncident + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
    DefinitionAn actual or occured eventDocumented information about an incident, its handling, assessments,and notifications
    Usage NoteIncident is realised or materialised risk
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    dex:E0070 :: Indicating personal data involved in an incident
    Date Created 2024-05-19
    Date Modified2024-08-16
    ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
    See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT in RISK
    - - -
    -

    Incident Assessment Report

    +
    +

    Incident Status

    - + - + - + @@ -13297,18 +17690,15 @@

    Incident Assessment Report

    - - @@ -13319,10 +17709,13 @@

    Incident Assessment Report

    - + + + + @@ -13332,15 +17725,18 @@

    Incident Assessment Report

    - + - + + + + - @@ -13349,23 +17745,23 @@

    Incident Assessment Report

    -
    -

    Incident Concluded

    +
    +

    Incident Status Unknown

    TermIncidentAssessmentReportIncidentStatus Prefix risk
    LabelIncident Assessment ReportIncident Status
    IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the assessment of an incident in terms of its effects or impactsStatus associated with an incident
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
    - + - + - + @@ -13397,7 +17793,7 @@

    Incident Concluded

    - + @@ -13429,46 +17825,45 @@

    Incident Concluded

    -
    -

    Incident Concluding Report

    + +
    +

    Incident Suspected

    TermIncidentConcludedIncidentStatusUnknown Prefix risk
    LabelIncident ConcludedIncident Status Unknown
    IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentStatusUnknown
    DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe status of a incident is unknown
    - + - + - + - + - - @@ -13479,7 +17874,7 @@

    Incident Concluding Report

    - + @@ -13492,15 +17887,18 @@

    Incident Concluding Report

    - + - + + + + - @@ -13508,23 +17906,23 @@

    Incident Concluding Report

    -
    -

    Incident Detection Report

    +
    +

    Incident Suspected Report

    TermIncidentConcludingReportIncidentSuspected Prefix risk
    LabelIncident Concluding ReportIncident Suspected
    IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentSuspected
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
    DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
    Date Created2024-05-192024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
    - + - + - + @@ -13558,7 +17956,7 @@

    Incident Detection Report

    - + @@ -13588,23 +17986,23 @@

    Incident Detection Report

    -
    -

    Incident Halted

    +
    +

    Incident Terminated

    TermIncidentDetectionReportIncidentSuspectedReport Prefix risk
    LabelIncident Detection ReportIncident Suspected Report
    IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentSuspectedReport
    DefinitionA report describing the detection of a IncidentA report describing the suspicion of an incident in the past or occuring
    - + - + - + @@ -13636,7 +18034,7 @@

    Incident Halted

    - + @@ -13668,48 +18066,45 @@

    Incident Halted

    -
    -

    Incident Handling Report

    + + + + +
    +

    Indirect Discrimination

    TermIncidentHaltedIncidentTerminated Prefix risk
    LabelIncident HaltedIncident Terminated
    IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentTerminated
    DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
    - + - + - + - + - - - - - + @@ -13718,7 +18113,7 @@

    Incident Handling Report

    - + @@ -13731,7 +18126,7 @@

    Incident Handling Report

    - + @@ -13739,7 +18134,7 @@

    Incident Handling Report

    - @@ -13747,33 +18142,42 @@

    Incident Handling Report

    -
    -

    Incident Identifier

    + + + + +
    +

    Individual Health & Safety

    TermIncidentHandlingReportIndirectDiscrimination Prefix risk
    LabelIncident Handling ReportIndirect Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IndirectDiscrimination
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified
    Date Created2024-05-192024-09-30
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + @@ -13783,10 +18187,7 @@

    Incident Identifier

    - - - - + @@ -13796,17 +18197,14 @@

    Incident Identifier

    - - - - + - @@ -13814,51 +18212,44 @@

    Incident Identifier

    -
    -

    Incident Impact Assessment

    + + + + +
    +

    Individual Risk

    TermIncidentIdentifierIndividualHealthSafety Prefix risk
    LabelIncident IdentifierIndividual Health & Safety
    IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IndividualHealthSafety
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    DefinitionIdentifier associated with an incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13867,7 +18258,7 @@

    Incident Impact Assessment

    - + @@ -13878,20 +18269,14 @@

    Incident Impact Assessment

    - - - - + - - - - + - @@ -13900,46 +18285,42 @@

    Incident Impact Assessment

    -
    -

    Incident Mitigated

    + + + +
    +

    Informativeness Bias

    TermIncidentImpactAssessmentIndividualRisk Prefix risk
    LabelIncident Impact AssessmentIndividual Risk
    IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IndividualRisk
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionAn impact assessment associated with a incidentRisks and issues that affect or have the potential to affect specific individuals
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -13948,31 +18329,34 @@

    Incident Mitigated

    - + - + + + + - + - + - @@ -13980,45 +18364,46 @@

    Incident Mitigated

    -
    -

    Incident Mitigation Measure

    + + + + +
    +

    In-Group Bias

    TermIncidentMitigatedInformativenessBias Prefix risk
    LabelIncident MitigatedInformativeness Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#InformativenessBias
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:EngineeringDecisionBias
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
    Source
    Date Created2024-02-142024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14027,28 +18412,34 @@

    Incident Mitigation Measure

    - + - + + + + - + - + + + + - @@ -14057,46 +18448,45 @@

    Incident Mitigation Measure

    -
    -

    Incident Near Miss

    + + + +
    +

    Injury

    TermIncidentMitigationMeasureInGroupBias Prefix risk
    LabelIncident Mitigation MeasureIn-Group Bias
    IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#InGroupBias
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
    DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againBias that occurs when showing partiality to one's own group or own characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14105,22 +18495,28 @@

    Incident Near Miss

    - + - + + + + - + - + + + + @@ -14129,7 +18525,7 @@

    Incident Near Miss

    - @@ -14137,57 +18533,55 @@

    Incident Near Miss

    -
    -

    Incident Notice

    + + + + + +
    +

    None

    TermIncidentNearMissInjury Prefix risk
    LabelIncident Near MissInjury
    IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#Injury
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"Concept representing Injury
    SourceISO/IEC 27005:2018
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + - - - - + @@ -14197,17 +18591,14 @@

    Incident Notice

    - - - - + - @@ -14215,47 +18606,39 @@

    Incident Notice

    - -
    -

    Incident Ongoing

    +
    +

    Integrity Concept

    TermIncidentNoticeIntegrityBreach Prefix risk
    LabelIncident NoticeNone
    IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IntegrityBreach
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionNotice associated with an Incident
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14264,9 +18647,12 @@

    Incident Ongoing

    - + - + + + + @@ -14277,7 +18663,7 @@

    Incident Ongoing

    - + @@ -14288,7 +18674,7 @@

    Incident Ongoing

    - @@ -14296,23 +18682,23 @@

    Incident Ongoing

    -
    -

    Incident Ongoing Report

    +
    +

    Integrity Incident

    TermIncidentOngoingIntegrityConcept Prefix risk
    LabelIncident OngoingIntegrity Concept
    IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IntegrityConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident is ongoing i.e. still activeIndicates a concept is relevant to 'Integrity' in CIA InfoSec model
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    Date Created2024-02-142024-09-29
    See More: section INCIDENT-STATUS in RISK + section CORE in RISK
    - + - + - + @@ -14324,18 +18710,14 @@

    Incident Ongoing Report

    - - @@ -14346,7 +18728,7 @@

    Incident Ongoing Report

    - + @@ -14375,48 +18757,46 @@

    Incident Ongoing Report

    -
    -

    Incident Preliminary Report

    + + + + +
    +

    Intentional Misuse

    TermIncidentOngoingReportIntegrityIncident Prefix risk
    LabelIncident Ongoing ReportIntegrity Incident
    IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#IntegrityIncident
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Incident + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure + risk:hasIncident
    DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedIncident where the integrity of information or system has been affected
    - + - + - + - + - - - - - + @@ -14425,7 +18805,7 @@

    Incident Preliminary Report

    - + @@ -14436,17 +18816,14 @@

    Incident Preliminary Report

    - - - - + - @@ -14454,47 +18831,47 @@

    Incident Preliminary Report

    -
    -

    Incident Register

    + + + + + +
    +

    Intercept Communications

    TermIncidentPreliminaryReportIntentionalMisuse Prefix risk
    LabelIncident Preliminary ReportIntentional Misuse
    IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#IntentionalMisuse
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Misuse + → risk:UserRisks + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownConcept represent an intentional misuse (of something)
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14503,22 +18880,31 @@

    Incident Register

    - + - + + + + - + + + + - + - + + + + @@ -14527,7 +18913,7 @@

    Incident Register

    - @@ -14535,47 +18921,50 @@

    Incident Register

    -
    -

    Incident Report

    + + + + + + + + +
    +

    Judicial Costs

    TermIncidentRegisterInterceptCommunications Prefix risk
    LabelIncident RegisterIntercept Communications
    IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#InterceptCommunications
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA register recording incidentes, their reports, notifications, and other related activitiesConcept representing Interception of Communications
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14584,7 +18973,7 @@

    Incident Report

    - + @@ -14595,17 +18984,14 @@

    Incident Report

    - - - - + - @@ -14613,45 +18999,46 @@

    Incident Report

    -
    -

    Incident Status

    + + + + +
    +

    Judicial Penalty

    TermIncidentReportJudicialCosts Prefix risk
    LabelIncident ReportJudicial Costs
    IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#JudicialCosts
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionDocumented information about an incident, its handling, assessments,and notificationsSomething that involves or causes judicial costs to be paid
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14660,13 +19047,10 @@

    Incident Status

    - + - - - @@ -14674,20 +19058,14 @@

    Incident Status

    - - - - + - - - - + - @@ -14696,46 +19074,44 @@

    Incident Status

    -
    -

    Incident Status Unknown

    + + + +
    +

    Language Discrimination

    TermIncidentStatusJudicialPenalty Prefix risk
    LabelIncident StatusJudicial Penalty
    IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#JudicialPenalty
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:Status - → dpv:Context + risk:FinancialLoss + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionStatus associated with an incidentSomething that involves or causes judicial penalties to be paid
    Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in DEX + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14744,7 +19120,7 @@

    Incident Status Unknown

    - + @@ -14757,18 +19133,15 @@

    Incident Status Unknown

    - + - - - - + - @@ -14777,46 +19150,42 @@

    Incident Status Unknown

    -
    -

    Incident Suspected

    + + +
    +

    Legal Compliance Risk

    TermIncidentStatusUnknownLanguageDiscrimination Prefix risk
    LabelIncident Status UnknownLanguage Discrimination
    IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#LanguageDiscrimination
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe status of a incident is unknownDiscrimination based on a person's language, often linked to national origin or ethnicity
    Date Created2024-02-142024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14825,7 +19194,7 @@

    Incident Suspected

    - + @@ -14836,20 +19205,14 @@

    Incident Suspected

    - - - - + - - - - + - @@ -14857,48 +19220,44 @@

    Incident Suspected

    -
    -

    Incident Suspected Report

    + + + + +
    +

    Legally Relevant Consequence

    TermIncidentSuspectedLegalComplianceRisk Prefix risk
    LabelIncident SuspectedLegal Compliance Risk
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#LegalComplianceRisk
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingRisks and consequences regarding legal compliance and its violation
    Date Created2024-02-14
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14907,7 +19266,7 @@

    Incident Suspected Report

    - + @@ -14918,17 +19277,14 @@

    Incident Suspected Report

    - - - - + - @@ -14937,46 +19293,43 @@

    Incident Suspected Report

    -
    -

    Incident Terminated

    + + + + +
    +

    Legal Risk Concept

    TermIncidentSuspectedReportLegallyRelevantConsequence Prefix risk
    LabelIncident Suspected ReportLegally Relevant Consequence
    IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#LegallyRelevantConsequence
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:LegalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
    DefinitionA report describing the suspicion of an incident in the past or occuringA consequence that is legally relevant i.e. actionable under law
    Date Created2024-05-19
    See More: section INCIDENT in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -14985,9 +19338,12 @@

    Incident Terminated

    - + - + + + + @@ -14998,18 +19354,15 @@

    Incident Terminated

    - + - - - - + - @@ -15021,40 +19374,36 @@

    Incident Terminated

    -
    -

    Indirect Discrimination

    +
    +

    Legal Support Limited

    TermIncidentTerminatedLegalRiskConcept Prefix risk
    LabelIncident TerminatedLegal Risk Concept
    IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#LegalRiskConcept
    Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RiskConcept
    Object of relation dpv:hasContext, - dpv:hasStatus -
    DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringRisk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process
    Usage NoteLegal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation
    Date Created2024-02-142024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT-STATUS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -15068,7 +19417,7 @@

    Indirect Discrimination

    - + @@ -15081,7 +19430,7 @@

    Indirect Discrimination

    - + @@ -15101,23 +19450,23 @@

    Indirect Discrimination

    -
    -

    Individual Health & Safety

    +
    +

    Lose of Credibility

    TermIndirectDiscriminationLegalSupportLimited Prefix risk
    LabelIndirect DiscriminationLegal Support Limited
    IRIhttps://w3id.org/dpv/risk#IndirectDiscriminationhttps://w3id.org/dpv/risk#LegalSupportLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionOccurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justifiedStub
    Date Created2024-09-302024-10-21
    - + - + - + @@ -15129,7 +19478,9 @@

    Individual Health & Safety

    - @@ -15140,19 +19491,34 @@

    Individual Health & Safety

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15168,33 +19534,39 @@

    Individual Health & Safety

    -
    -

    Individual Risk

    + +
    +

    Lose of Customer Confidence

    TermIndividualHealthSafetyLoseCredibility Prefix risk
    LabelIndividual Health & SafetyLose of Credibility
    IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LoseCredibility
    Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionConcept representing Loss of Credibility
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - + + + @@ -15206,20 +19578,32 @@

    Individual Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -15236,35 +19620,37 @@

    Individual Risk

    -
    -

    Informativeness Bias

    +
    +

    Lose of Goodwill

    TermIndividualRiskLoseCustomerConfidence Prefix risk
    LabelIndividual RiskLose of Customer Confidence
    IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCustomerConfidence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionRisks and issues that affect or have the potential to affect specific individualsConcept representing Loss of Customer Confidence
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15277,7 +19663,7 @@

    Informativeness Bias

    - + @@ -15286,19 +19672,22 @@

    Informativeness Bias

    - + - + - + + + + - + @@ -15316,37 +19705,37 @@

    Informativeness Bias

    -
    -

    In-Group Bias

    +
    +

    Lose of Negotiating Capacity

    TermInformativenessBiasLoseGoodwill Prefix risk
    LabelInformativeness BiasLose of Goodwill
    IRIhttps://w3id.org/dpv/risk#InformativenessBiashttps://w3id.org/dpv/risk#LoseGoodwill
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:EngineeringDecisionBias + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some groupConcept representing Loss of Goodwill
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + - + - @@ -15359,7 +19748,7 @@

    In-Group Bias

    - + @@ -15368,19 +19757,22 @@

    In-Group Bias

    - + - + - + + + + - + @@ -15398,23 +19790,23 @@

    In-Group Bias

    -
    -

    Injury

    +
    +

    Lose of Opportunity

    TermInGroupBiasLoseNegotiatingCapacity Prefix risk
    LabelIn-Group BiasLose of Negotiating Capacity
    IRIhttps://w3id.org/dpv/risk#InGroupBiashttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when showing partiality to one's own group or own characteristicsConcept representing Loss of Negotiating Capacity
    SourceISO/IEC 27005:2018
    Date Created2024-09-132022-08-17
    Date Modified2024-08-16
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    - + - + - + @@ -15426,8 +19818,9 @@

    Injury

    - @@ -15440,7 +19833,7 @@

    Injury

    - + @@ -15482,38 +19875,36 @@

    Injury

    - -
    -

    None

    +
    +

    Lose of Reputation

    TermInjuryLoseOpportunity Prefix risk
    LabelInjuryLose of Opportunity
    IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseOpportunity
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes InjuryConcept representing Loss of Opportunity
    - + - + - + - + - @@ -15525,19 +19916,34 @@

    None

    - + + + + - + + + + - - - + + + + + + + + + + + + @@ -15550,35 +19956,41 @@

    None

    -
    -

    Integrity Concept

    + + + + +
    +

    Lose of Trust

    TermIntegrityBreachLoseReputation Prefix risk
    LabelNoneLose of Reputation
    IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseReputation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRisk + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionConcept representing Loss of Reputation
    SourceISO/IEC 27005:2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -15591,25 +20003,28 @@

    Integrity Concept

    - + - - - - + - + + + + - + - + + + + @@ -15618,7 +20033,7 @@

    Integrity Concept

    - @@ -15626,42 +20041,51 @@

    Integrity Concept

    -
    -

    Integrity Incident

    + +
    +

    Low Likelihood

    TermIntegrityConceptLoseTrust Prefix risk
    LabelIntegrity ConceptLose of Trust
    IRIhttps://w3id.org/dpv/risk#IntegrityConcepthttps://w3id.org/dpv/risk#LoseTrust
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types dpv:RiskConcept + risk:ReputationalRisk + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept is relevant to 'Integrity' in CIA InfoSec modelConcept representing Loss of Trust
    Usage NoteThis concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact
    SourceISO/IEC 27005:2018
    Date Created2024-09-292022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - + + + + - @@ -15672,9 +20096,12 @@

    Integrity Incident

    - + - + + + + @@ -15685,15 +20112,18 @@

    Integrity Incident

    - + - + + + + - @@ -15702,44 +20132,52 @@

    Integrity Incident

    - - - -
    -

    Intentional Misuse

    +
    +

    Low Risk

    TermIntegrityIncidentLowLikelihood Prefix risk
    LabelIntegrity IncidentLow Likelihood
    IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LowLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation risk:hasIncident + dpv:hasLikelihood
    DefinitionIncident where the integrity of information or system has been affectedLevel where Likelihood is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2024-05-192022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section INCIDENT in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15748,9 +20186,12 @@

    Intentional Misuse

    - + - + + + + @@ -15759,14 +20200,20 @@

    Intentional Misuse

    - + + + + - + + + + - @@ -15775,45 +20222,52 @@

    Intentional Misuse

    - - - - -
    -

    Intercept Communications

    +
    +

    Low Severity

    TermIntentionalMisuseLowRisk Prefix risk
    LabelIntentional MisuseLow Risk
    IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LowRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:Misuse - → risk:UserRisks - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionIntentional MisuseLevel where Risk is Low
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -15822,31 +20276,25 @@

    Intercept Communications

    - + - + - - - - + - + - - - - + @@ -15855,7 +20303,7 @@

    Intercept Communications

    - @@ -15867,27 +20315,23 @@

    Intercept Communications

    - - - - -
    -

    Judicial Costs

    +
    +

    Loyalty Program Exclusion

    TermInterceptCommunicationsLowSeverity Prefix risk
    LabelIntercept CommunicationsLow Severity
    IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LowSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Interception of CommunicationsLevel where Severity is Low
    Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + @@ -15899,8 +20343,8 @@

    Judicial Costs

    - @@ -15914,7 +20358,7 @@

    Judicial Costs

    - + @@ -15925,7 +20369,10 @@

    Judicial Costs

    - + + + + @@ -15944,36 +20391,36 @@

    Judicial Costs

    -
    -

    Judicial Penalty

    +
    +

    Malicious Activity

    TermJudicialCostsLoyaltyProgramExclusion Prefix risk
    LabelJudicial CostsLoyalty Program Exclusion
    IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoyaltyProgramExclusion
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial costs to be paidStub
    Date Created2024-10-21
    - + - + - + - + - @@ -15987,7 +20434,7 @@

    Judicial Penalty

    - + @@ -16017,40 +20464,39 @@

    Judicial Penalty

    -
    -

    Language Discrimination

    + + +
    +

    Malicious Code Attack

    TermJudicialPenaltyMaliciousActivity Prefix risk
    LabelJudicial PenaltyMalicious Activity
    IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#MaliciousActivity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:FinancialLoss - → risk:FinancialImpact + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that involves or causes judicial penalties to be paidIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others
    - + - + - + - + - - - @@ -16064,23 +20510,32 @@

    Language Discrimination

    - + - + + + + - + - - + + + + + + + + @@ -16096,35 +20551,41 @@

    Language Discrimination

    -
    -

    Legal Risk

    + + + +
    +

    Malware Attack

    TermLanguageDiscriminationMaliciousCodeAttack Prefix risk
    LabelLanguage DiscriminationMalicious Code Attack
    IRIhttps://w3id.org/dpv/risk#LanguageDiscriminationhttps://w3id.org/dpv/risk#MaliciousCodeAttack
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's language, often linked to national origin or ethnicityConcept representing Malicious Code Attack
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2024-09-302022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16137,20 +20598,32 @@

    Legal Risk

    - + - + + + + - - - + + + + + + + + + + + + @@ -16167,23 +20640,23 @@

    Legal Risk

    -
    -

    Lose of Credibility

    +
    +

    Material Damage

    TermLegalRiskMalwareAttack Prefix risk
    LabelLegal RiskMalware Attack
    IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#MalwareAttack
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types dpv:RiskConcept + risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that have their basis in legal requirements and enforcementConcept representing Malware Attack
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -16195,7 +20668,8 @@

    Lose of Credibility

    - @@ -16209,23 +20683,23 @@

    Lose of Credibility

    - + - + + + + - - - - + - + @@ -16251,35 +20725,37 @@

    Lose of Credibility

    -
    -

    Lose of Customer Confidence

    +
    +

    Misandry

    TermLoseCredibilityMaterialDamage Prefix risk
    LabelLose of CredibilityMaterial Damage
    IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#MaterialDamage
    Broader/Parent types risk:ReputationalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of CredibilityConcept representing Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-03-30
    Date Modified
    - + - + - + - + - @@ -16293,32 +20769,23 @@

    Lose of Customer Confidence

    - + - - - - + - + - - - - - - - - + + @@ -16335,35 +20802,37 @@

    Lose of Customer Confidence

    -
    -

    Lose of Goodwill

    +
    +

    Misogyny

    TermLoseCustomerConfidenceMisandry Prefix risk
    LabelLose of Customer ConfidenceMisandry
    IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#Misandry
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Customer ConfidenceDislike, contempt, or prejudice against men
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16377,32 +20846,23 @@

    Lose of Goodwill

    - + - - - - + - + - - - - - - - - + + @@ -16419,35 +20879,36 @@

    Lose of Goodwill

    -
    -

    Lose of Negotiating Capacity

    +
    +

    Misuse

    TermLoseGoodwillMisogyny Prefix risk
    LabelLose of GoodwillMisogyny
    IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#Misogyny
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:ReputationalRisk + risk:Sexism + → risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of GoodwillDislike, contempt, or prejudice against women
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -16461,23 +20922,20 @@

    Lose of Negotiating Capacity

    - + - - - - + - + @@ -16485,7 +20943,7 @@

    Lose of Negotiating Capacity

    - + @@ -16500,43 +20958,52 @@

    Lose of Negotiating Capacity

    - - - -
    -

    Lose of Opportunity

    +
    +

    Moderate Likelihood

    TermLoseNegotiatingCapacityMisuse Prefix risk
    LabelLose of Negotiating CapacityMisuse
    IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#Misuse
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:ReputationalRisk + risk:UserRisks + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Loss of Negotiating CapacityConcept representing a misuse (of something)
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-06-11
    Date Modified
    ContributorsHarshvardhan J. PanditDelaram Golpayegani
    - + - + - + - + - + + + + - + + + + @@ -16545,28 +21012,25 @@

    Lose of Opportunity

    - + - + + + + - - - - + - + - - - - + @@ -16575,7 +21039,7 @@

    Lose of Opportunity

    - @@ -16584,43 +21048,52 @@

    Lose of Opportunity

    - - - -
    -

    Lose of Reputation

    +
    +

    Moderate Risk

    TermLoseOpportunityModerateLikelihood Prefix risk
    LabelLose of OpportunityModerate Likelihood
    IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#ModerateLikelihood
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Likelihood
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
    Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
    Object of relation dpv:hasLikelihood +
    DefinitionSomething that acts as or causes Loss of OpportunityLevel where Likelihood is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16629,28 +21102,25 @@

    Lose of Reputation

    - + - + + + + - - - - + - + - - - - + @@ -16659,7 +21129,7 @@

    Lose of Reputation

    - @@ -16668,43 +21138,52 @@

    Lose of Reputation

    - - - -
    -

    Lose of Trust

    +
    +

    Moderate Severity

    TermLoseReputationModerateRisk Prefix risk
    LabelLose of ReputationModerate Risk
    IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskLevel
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
    Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
    Object of relation dpv:hasRiskLevel +
    DefinitionSomething that acts as or causes Loss of ReputationLevel where Risk is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - + + + + - + + + + @@ -16713,28 +21192,25 @@

    Lose of Trust

    - + - + + + + - - - - + - + - - - - + @@ -16743,7 +21219,7 @@

    Lose of Trust

    - @@ -16752,50 +21228,46 @@

    Lose of Trust

    -
    -

    Low Likelihood

    +
    +

    Monitor Consequence

    TermLoseTrustModerateSeverity Prefix risk
    LabelLose of TrustModerate Severity
    IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateSeverity
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:Severity
    Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
    Broader/Parent types risk:7SeverityLevels + → dpv:Severity
    Object of relation dpv:hasSeverity +
    DefinitionSomething that acts as or causes Loss of TrustLevel where Severity is Moderate
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    SourceISO/IEC 27005:2018
    Date Created2022-08-172022-08-18
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-LEVELS in RISK
    - + - + - + - + - - - - - - @@ -16806,12 +21278,9 @@

    Low Likelihood

    - + - - - - + @@ -16822,7 +21291,7 @@

    Low Likelihood

    - + @@ -16833,7 +21302,7 @@

    Low Likelihood

    - @@ -16842,50 +21311,45 @@

    Low Likelihood

    -
    -

    Low Risk

    +
    +

    Monitor Control

    TermLowLikelihoodMonitorConsequence Prefix risk
    LabelLow LikelihoodMonitor Consequence
    IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#MonitorConsequence
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Likelihood is LowControl that monitors a Risk Consequence
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16896,11 +21360,11 @@

    Low Risk

    - + - + @@ -16912,7 +21376,7 @@

    Low Risk

    - + @@ -16923,7 +21387,7 @@

    Low Risk

    - @@ -16932,50 +21396,46 @@

    Low Risk

    -
    -

    Low Severity

    +
    +

    Monitor Impact

    TermLowRiskMonitorControl Prefix risk
    LabelLow RiskMonitor Control
    IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorControl
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Risk is LowRisk Mitigation Measure that uses controls to monitor events
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - - - @@ -16986,12 +21446,9 @@

    Low Severity

    - + - - - - + @@ -17002,7 +21459,7 @@

    Low Severity

    - + @@ -17013,7 +21470,7 @@

    Low Severity

    - @@ -17022,43 +21479,48 @@

    Low Severity

    - - - -
    -

    Malicious Activity

    +
    +

    Monitor Risk

    TermLowSeverityMonitorImpact Prefix risk
    LabelLow SeverityMonitor Impact
    IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorImpact
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
    DefinitionLevel where Severity is LowControl that monitors a Risk Impact
    Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
    Date Created2022-08-182024-05-19
    See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17067,7 +21529,7 @@

    Malicious Activity

    - + @@ -17078,14 +21540,20 @@

    Malicious Activity

    - + + + + - + + + + - @@ -17094,46 +21562,48 @@

    Malicious Activity

    - - - - - -
    -

    Malicious Code Attack

    +
    +

    Monitor Control

    TermMaliciousActivityMonitorRisk Prefix risk
    LabelMalicious ActivityMonitor Risk
    IRIhttps://w3id.org/dpv/risk#MaliciousActivityhttps://w3id.org/dpv/risk#MonitorRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIntentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to othersControl that monitors a Risk
    Date Created2024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17142,28 +21612,22 @@

    Malicious Code Attack

    - + - - - - + - + - - - - + @@ -17172,7 +21636,7 @@

    Malicious Code Attack

    - @@ -17181,46 +21645,48 @@

    Malicious Code Attack

    - - - - - -
    -

    Malware Attack

    +
    +

    Monitor Risk Source

    TermMaliciousCodeAttackMonitorRiskControl Prefix risk
    LabelMalicious Code AttackMonitor Control
    IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorRiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors another Control
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17229,28 +21695,22 @@

    Malware Attack

    - + - - - - + - + - - - - + @@ -17259,7 +21719,7 @@

    Malware Attack

    - @@ -17268,43 +21728,48 @@

    Malware Attack

    - - - -
    -

    Material Damage

    +
    +

    Monitor Vulnerabilities

    TermMalwareAttackMonitorRiskSource Prefix risk
    LabelMalware AttackMonitor Risk Source
    IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk Source
    SourceENISA Methodology for Sectoral Cybersecurity Assessments
    Date Created2022-08-172024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -17313,12 +21778,9 @@

    Material Damage

    - + - - - - + @@ -17329,12 +21791,9 @@

    Material Damage

    - + - - - - + @@ -17343,7 +21802,7 @@

    Material Damage

    - @@ -17355,23 +21814,23 @@

    Material Damage

    -
    -

    Misandry

    +
    +

    Nationality Discrimination

    TermMaterialDamageMonitorVulnerabilities Prefix risk
    LabelMaterial DamageMonitor Vulnerabilities
    IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorVulnerabilities
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionSomething that acts as or causes Material DamageControl that monitors a Risk Vulnerability
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-302024-05-19
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -17383,14 +21842,8 @@

    Misandry

    - - - @@ -17404,7 +21857,7 @@

    Misandry

    - + @@ -17437,42 +21890,36 @@

    Misandry

    -
    -

    Misogyny

    +
    +

    Non-Material Damage

    TermMisandryNationalityDiscrimination Prefix risk
    LabelMisandryNationality Discrimination
    IRIhttps://w3id.org/dpv/risk#Misandryhttps://w3id.org/dpv/risk#NationalityDiscrimination
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against menDiscrimination based on a person's nationality or citizenship
    - + - + - + - + - - - @@ -17486,9 +21933,12 @@

    Misogyny

    - + - + + + + @@ -17499,10 +21949,16 @@

    Misogyny

    - + - - + + + + + + + + @@ -17519,35 +21975,38 @@

    Misogyny

    -
    -

    Misuse

    +
    +

    Non-Normality Bias

    TermMisogynyNonMaterialDamage Prefix risk
    LabelMisogynyNon-Material Damage
    IRIhttps://w3id.org/dpv/risk#Misogynyhttps://w3id.org/dpv/risk#NonMaterialDamage
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + risk:LegallyRelevantConsequence + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionDislike, contempt, or prejudice against womenConcept representing Non-Material Damage
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2024-09-302022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -17561,28 +22020,28 @@

    Misuse

    - + - + + + + - + - - - - + - + @@ -17597,52 +22056,47 @@

    Misuse

    -
    -

    Moderate Likelihood

    + + + +
    +

    Non-Response Bias

    TermMisuseNonNormalityBias Prefix risk
    LabelMisuseNon-Normality Bias
    IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#NonNormalityBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:UserRisks + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes MisuseBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
    Source
    Date Created2024-06-112024-09-13
    Date Modified2024-08-16
    ContributorsDelaram GolpayeganiDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - - - - - - - + @@ -17651,34 +22105,34 @@

    Moderate Likelihood

    - + - - - - + - + + + + - + - + - @@ -17687,52 +22141,42 @@

    Moderate Likelihood

    -
    -

    Moderate Risk

    + + +
    +

    Operational Security Risk

    TermModerateLikelihoodNonResponseBias Prefix risk
    LabelModerate LikelihoodNon-Response Bias
    IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#NonResponseBias
    Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
    Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasLikelihood -
    DefinitionLevel where Likelihood is ModerateBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Source
    Date Created2022-08-182024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17741,12 +22185,9 @@

    Moderate Risk

    - + - - - - + @@ -17755,20 +22196,14 @@

    Moderate Risk

    - - - - + - - - - + - @@ -17777,52 +22212,43 @@

    Moderate Risk

    -
    -

    Moderate Severity

    + + + + +
    +

    Organisational Risk Concept

    TermModerateRiskOperationalSecurityRisk Prefix risk
    LabelModerate RiskOperational Security Risk
    IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#OperationalSecurityRisk
    Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
    Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasRiskLevel -
    DefinitionLevel where Risk is ModerateRisks and issues that arise during operational processes
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
    Date Created2022-08-18
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - - - - - + @@ -17831,11 +22257,11 @@

    Moderate Severity

    - + - + @@ -17847,18 +22273,15 @@

    Moderate Severity

    - + - - - - + - @@ -17867,48 +22290,45 @@

    Moderate Severity

    -
    -

    Monitor Consequence

    + + + +
    +

    Out-Group Homogeneity Bias

    TermModerateSeverityOrganisationalRiskConcept Prefix risk
    LabelModerate SeverityOrganisational Risk Concept
    IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#OrganisationalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
    Broader/Parent types risk:7SeverityLevels - → dpv:Severity + dpv:RiskConcept
    Object of relation dpv:hasSeverity -
    DefinitionLevel where Severity is ModerateRisk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process
    Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1Organisational in this context refers to an organisation which is not human but is managed by humans
    Date Created2022-08-182024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-LEVELS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17917,31 +22337,34 @@

    Monitor Consequence

    - + - + + + + - + - + - @@ -17950,47 +22373,45 @@

    Monitor Consequence

    -
    -

    Monitor Control

    + + + +
    +

    Payment

    TermMonitorConsequenceOutGroupHomogeneityBias Prefix risk
    LabelMonitor ConsequenceOut-Group Homogeneity Bias
    IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ConsequenceBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
    Source
    Date Created2024-05-192024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -17999,12 +22420,9 @@

    Monitor Control

    - + - - - - + @@ -18015,18 +22433,21 @@

    Monitor Control

    - + - + + + + - + - @@ -18035,48 +22456,44 @@

    Monitor Control

    -
    -

    Monitor Impact

    + + + +
    +

    Personalisation Disabled

    TermMonitorControlPayment Prefix risk
    LabelMonitor ControlPayment
    IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#Payment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionRisk Mitigation Measure that uses controls to monitor eventsSomething that acts as or provides payment e.g. to access a service or purchase resources
    Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18085,7 +22502,7 @@

    Monitor Impact

    - + @@ -18098,18 +22515,15 @@

    Monitor Impact

    - + - - - - + - @@ -18118,48 +22532,44 @@

    Monitor Impact

    -
    -

    Monitor Risk

    + + + +
    +

    Personalisation Enabled

    TermMonitorImpactPersonalisationDisabled Prefix risk
    LabelMonitor ImpactPersonalisation Disabled
    IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#PersonalisationDisabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk ImpactStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18168,7 +22578,7 @@

    Monitor Risk

    - + @@ -18181,18 +22591,15 @@

    Monitor Risk

    - + - - - - + - @@ -18201,48 +22608,44 @@

    Monitor Risk

    -
    -

    Monitor Control

    + + + +
    +

    Personal Safety Endangerment

    TermMonitorRiskPersonalisationEnabled Prefix risk
    LabelMonitor RiskPersonalisation Enabled
    IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#PersonalisationEnabled
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a RiskStub
    Date Created2024-05-192024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18251,22 +22654,28 @@

    Monitor Control

    - + - + + + + - + - + + + + @@ -18275,7 +22684,7 @@

    Monitor Control

    - @@ -18284,48 +22693,46 @@

    Monitor Control

    -
    -

    Monitor Risk Source

    + + + + +
    +

    Phishing Scam

    TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
    LabelMonitor ControlPersonal Safety Endangerment
    IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors another ControlConcept representing Personal Safety Endangerment
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18334,22 +22741,28 @@

    Monitor Risk Source

    - + - + + + + - + - + + + + @@ -18358,7 +22771,7 @@

    Monitor Risk Source

    - @@ -18367,48 +22780,45 @@

    Monitor Risk Source

    -
    -

    Monitor Vulnerabilities

    + + + +
    +

    Physical Assault

    TermMonitorRiskSourcePhishingScam Prefix risk
    LabelMonitor Risk SourcePhishing Scam
    IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk SourceConcept representing Phishing Scam
    SourceENISA Threat Landscape for Ransomware Attacks 2022
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -18417,22 +22827,28 @@

    Monitor Vulnerabilities

    - + - + + + + - + - + + + + @@ -18441,7 +22857,7 @@

    Monitor Vulnerabilities

    - @@ -18453,40 +22869,37 @@

    Monitor Vulnerabilities

    -
    -

    Nationality Discrimination

    +
    +

    Physical Harm

    TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
    LabelMonitor VulnerabilitiesPhysical Assault
    IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that monitors a Risk VulnerabilityConcept representing Physical Assault
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - @@ -18498,10 +22911,7 @@

    Nationality Discrimination

    - - - - + @@ -18511,10 +22921,7 @@

    Nationality Discrimination

    - - - - + @@ -18532,36 +22939,35 @@

    Nationality Discrimination

    - -
    -

    Non-Material Damage

    +
    +

    Policy Risk

    TermNationalityDiscriminationPhysicalHarm Prefix risk
    LabelNationality DiscriminationPhysical Harm
    IRIhttps://w3id.org/dpv/risk#NationalityDiscriminationhttps://w3id.org/dpv/risk#PhysicalHarm
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's nationality or citizenship
    Date Created2024-09-30
    - + - + - + - + - @@ -18575,12 +22981,9 @@

    Non-Material Damage

    - + - - - - + @@ -18589,18 +22992,9 @@

    Non-Material Damage

    - - - - - - - - - - - - + + + @@ -18613,42 +23007,35 @@

    Non-Material Damage

    - - - - -
    -

    Non-Normality Bias

    +
    +

    Potential Consequence

    TermNonMaterialDamagePolicyRisk Prefix risk
    LabelNon-Material DamagePolicy Risk
    IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PolicyRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:LegalRisk + risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Non-Material DamageRisks and consequences regarding policy and its associated processes
    Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
    Date Created2022-03-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -18661,34 +23048,34 @@

    Non-Normality Bias

    - + - + + + + - - - - + - + - + - @@ -18696,43 +23083,35 @@

    Non-Normality Bias

    - - - - -
    -

    Non-Response Bias

    +
    +

    Potential Impact

    TermNonNormalityBiasPotentialConsequence Prefix risk
    LabelNon-Normality BiasPotential Consequence
    IRIhttps://w3id.org/dpv/risk#NonNormalityBiashttps://w3id.org/dpv/risk#PotentialConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleadingIndicates a concept can potentially be a 'consequence concept within an use-case
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18745,34 +23124,34 @@

    Non-Response Bias

    - + - + + + + - - - - + - + - + - @@ -18780,33 +23159,30 @@

    Non-Response Bias

    - - - -
    -

    Operational Security Risk

    +
    +

    Potential Risk

    TermNonResponseBiasPotentialImpact Prefix risk
    LabelNon-Response BiasPotential Impact
    IRIhttps://w3id.org/dpv/risk#NonResponseBiashttps://w3id.org/dpv/risk#PotentialImpact
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation biasIndicates a concept can potentially be a 'impact' concept within an use-case
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + @@ -18824,9 +23200,12 @@

    Operational Security Risk

    - + - + + + + @@ -18835,14 +23214,20 @@

    Operational Security Risk

    - + + + + - + + + + - @@ -18850,41 +23235,35 @@

    Operational Security Risk

    - - - - -
    -

    Out-Group Homogeneity Bias

    +
    +

    Potential RiskSource

    TermOperationalSecurityRiskPotentialRisk Prefix risk
    LabelOperational Security RiskPotential Risk
    IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#PotentialRisk
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept
    DefinitionRisks and issues that arise during operational processesIndicates a concept can potentially be a 'risk' concept within an use-case
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-29
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -18897,34 +23276,34 @@

    Out-Group Homogeneity Bias

    - + - + + + + - - - - + - + - + - @@ -18936,23 +23315,23 @@

    Out-Group Homogeneity Bias

    -
    -

    Payment

    +
    +

    Privacy

    TermOutGroupHomogeneityBiasPotentialRiskSource Prefix risk
    LabelOut-Group Homogeneity BiasPotential RiskSource
    IRIhttps://w3id.org/dpv/risk#OutGroupHomogeneityBiashttps://w3id.org/dpv/risk#PotentialRiskSource
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + dpv:RiskConcept
    DefinitionBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristicsIndicates a concept can potentially be a 'risk source' concept within an use-case
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Source
    Date Created2024-09-132024-09-29
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + @@ -18964,8 +23343,8 @@

    Payment

    - @@ -18977,10 +23356,7 @@

    Payment

    - - - - + @@ -18990,18 +23366,9 @@

    Payment

    - - - - - - - - - - - - + + + @@ -19018,23 +23385,23 @@

    Payment

    -
    -

    Personal Safety Endangerment

    +
    +

    Psychological Harm

    TermPaymentPrivacy Prefix risk
    LabelPaymentPrivacy
    IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#Privacy
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact + risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resources
    Date Created2024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    - + - + - + @@ -19046,7 +23413,9 @@

    Personal Safety Endangerment

    - @@ -19060,7 +23429,7 @@

    Personal Safety Endangerment

    - + @@ -19069,7 +23438,7 @@

    Personal Safety Endangerment

    - + @@ -19101,38 +23470,36 @@

    Personal Safety Endangerment

    - - -
    -

    Phishing Scam

    +
    +

    Public Order Breach

    TermPersonalSafetyEndangermentPsychologicalHarm Prefix risk
    LabelPersonal Safety EndangermentPsychological Harm
    IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PsychologicalHarm
    Broader/Parent types risk:SocietalRisk + risk:Harm + → risk:IndividualRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Personal Safety EndangermentConcept representing Psychological Harm
    SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
    - + - + - + - + - @@ -19146,7 +23513,7 @@

    Phishing Scam

    - + @@ -19155,7 +23522,7 @@

    Phishing Scam

    - + @@ -19188,23 +23555,23 @@

    Phishing Scam

    -
    -

    Physical Assault

    +
    +

    Public Services Exclusion

    TermPhishingScamPublicOrderBreach Prefix risk
    LabelPhishing ScamPublic Order Breach
    IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#PublicOrderBreach
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:LegalComplianceRisk + → risk:LegalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Phishing ScamConcept representing Public Order Breach
    SourceENISA Threat Landscape for Ransomware Attacks 2022ISO/IEC 27005:2018
    - + - + - + @@ -19216,8 +23583,9 @@

    Physical Assault

    - @@ -19230,32 +23598,23 @@

    Physical Assault

    - + - - - - + - + - - - - - - - - + + @@ -19272,36 +23631,38 @@

    Physical Assault

    -
    -

    Physical Harm

    +
    +

    Racial Discrimination

    TermPhysicalAssaultPublicServicesExclusion Prefix risk
    LabelPhysical AssaultPublic Services Exclusion
    IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#PublicServicesExclusion
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Physical AssaultStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -19312,7 +23673,10 @@

    Physical Harm

    - + + + + @@ -19322,7 +23686,10 @@

    Physical Harm

    - + + + + @@ -19337,35 +23704,41 @@

    Physical Harm

    -
    -

    Potential Consequence

    + + + + +
    +

    Racism

    TermPhysicalHarmRacialDiscrimination Prefix risk
    LabelPhysical HarmRacial Discrimination
    IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#RacialDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:Racism + → risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionDiscrimination against individuals because of their racial background or skin color
    Date Created2024-09-30
    - + - + - + - + - @@ -19378,12 +23751,9 @@

    Potential Consequence

    - + - - - - + @@ -19394,18 +23764,15 @@

    Potential Consequence

    - + - - - - + - @@ -19413,39 +23780,48 @@

    Potential Consequence

    -
    -

    Potential Impact

    + +
    +

    Recovery Control

    TermPotentialConsequenceRacism Prefix risk
    LabelPotential ConsequenceRacism
    IRIhttps://w3id.org/dpv/risk#PotentialConsequencehttps://w3id.org/dpv/risk#Racism
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types dpv:RiskConcept + risk:Discrimination + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionIndicates a concept can potentially be a 'consequence concept within an use-casePrejudice or discrimination against people based on their race
    Usage NotePotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-09-30
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - + + + + @@ -19454,12 +23830,9 @@

    Potential Impact

    - + - - - - + @@ -19470,18 +23843,15 @@

    Potential Impact

    - + - - - - + - @@ -19489,39 +23859,49 @@

    Potential Impact

    -
    -

    Potential Risk

    + +
    +

    Reduce Likelihood

    TermPotentialImpactRecoveryControl Prefix risk
    LabelPotential ImpactRecovery Control
    IRIhttps://w3id.org/dpv/risk#PotentialImpacthttps://w3id.org/dpv/risk#RecoveryControl
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'impact' concept within an use-caseControl to recover from event
    Usage NotePotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19530,12 +23910,9 @@

    Potential Risk

    - + - - - - + @@ -19546,7 +23923,7 @@

    Potential Risk

    - + @@ -19557,7 +23934,7 @@

    Potential Risk

    - @@ -19565,39 +23942,49 @@

    Potential Risk

    -
    -

    Potential RiskSource

    + +
    +

    Reduce Severity

    TermPotentialRiskReduceLikelihood Prefix risk
    LabelPotential RiskReduce Likelihood
    IRIhttps://w3id.org/dpv/risk#PotentialRiskhttps://w3id.org/dpv/risk#ReduceLikelihood
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk' concept within an use-caseControl that reduces the likelihood of an event
    Usage NotePotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + @@ -19606,12 +23993,9 @@

    Potential RiskSource

    - + - - - - + @@ -19622,7 +24006,7 @@

    Potential RiskSource

    - + @@ -19633,7 +24017,7 @@

    Potential RiskSource

    - @@ -19642,49 +24026,57 @@

    Potential RiskSource

    - - - -
    -

    Privacy

    +
    +

    Reduction Control

    TermPotentialRiskSourceReduceSeverity Prefix risk
    LabelPotential RiskSourceReduce Severity
    IRIhttps://w3id.org/dpv/risk#PotentialRiskSourcehttps://w3id.org/dpv/risk#ReduceSeverity
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types dpv:RiskConcept + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionIndicates a concept can potentially be a 'risk source' concept within an use-caseControl that reduces the severity of an event
    Usage NotePotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case
    Date Created2024-09-292024-05-19
    See More: section CORE in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - + + + + - + + + + @@ -19694,14 +24086,17 @@

    Privacy

    - + + + + - @@ -19713,36 +24108,40 @@

    Privacy

    -
    -

    Psychological Harm

    + + + +
    +

    Re-identification

    TermPrivacyReductionControl Prefix risk
    LabelPrivacyReduction Control
    IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionControl that reduces the likelihood or severity of an event
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - @@ -19755,23 +24154,23 @@

    Psychological Harm

    - + - + + + + - - - - + - + @@ -19796,35 +24195,37 @@

    Psychological Harm

    -
    -

    Public Order Breach

    + +
    +

    Religious Discrimination

    TermPsychologicalHarmReidentification Prefix risk
    LabelPsychological HarmRe-identification
    IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:Harm - → risk:IndividualRisk + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Psychological HarmConcept representing Re-identification
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172022-08-19
    Date Modified
    - + - + - + - + - @@ -19838,32 +24239,23 @@

    Public Order Breach

    - + - - - - + - + - - - - - - - - + + @@ -19877,50 +24269,47 @@

    Public Order Breach

    - - - -
    -

    Racial Discrimination

    +
    +

    Remedy Control

    TermPublicOrderBreachReligiousDiscrimination Prefix risk
    LabelPublic Order BreachReligious Discrimination
    IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#ReligiousDiscrimination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRiskrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept
    Broader/Parent types risk:LegalRisk + risk:Discrimination + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Public Order BreachDiscrimination based on a person's religious beliefs or practices
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-09-30
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - - - - + + + + @@ -19929,7 +24318,7 @@

    Racial Discrimination

    - + @@ -19942,7 +24331,7 @@

    Racial Discrimination

    - + @@ -19950,7 +24339,7 @@

    Racial Discrimination

    - @@ -19959,48 +24348,48 @@

    Racial Discrimination

    - - - -
    -

    Racism

    +
    +

    Remove Consequence

    TermRacialDiscriminationRemedyControl Prefix risk
    LabelRacial DiscriminationRemedy Control
    IRIhttps://w3id.org/dpv/risk#RacialDiscriminationhttps://w3id.org/dpv/risk#RemedyControl
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Racism - → risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionDiscrimination against individuals because of their racial background or skin colorControl to remedy consequences of event
    Date Created2024-09-302024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + - + - - - - + + + + @@ -20009,7 +24398,7 @@

    Racism

    - + @@ -20022,15 +24411,18 @@

    Racism

    - + - + + + + - @@ -20039,23 +24431,23 @@

    Racism

    -
    -

    Recovery Control

    +
    +

    Remove Impact

    TermRacismRemoveConsequence Prefix risk
    LabelRacismRemove Consequence
    IRIhttps://w3id.org/dpv/risk#Racismhttps://w3id.org/dpv/risk#RemoveConsequence
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk - → dpv:RiskConcept + risk:ConsequenceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionPrejudice or discrimination against people based on their raceControl that removes Consequence i.e. prevents it from materialising
    Date Created2024-09-302024-05-19
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in RISK
    - + - + - + @@ -20067,7 +24459,8 @@

    Recovery Control

    - @@ -20077,7 +24470,7 @@

    Recovery Control

    @@ -20088,7 +24481,7 @@

    Recovery Control

    - + @@ -20104,7 +24497,10 @@

    Recovery Control

    - + + + + @@ -20118,23 +24514,23 @@

    Recovery Control

    -
    -

    Reduce Likelihood

    +
    +

    Remove Source

    TermRecoveryControlRemoveImpact Prefix risk
    LabelRecovery ControlRemove Impact
    IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveImpact
    Broader/Parent types risk:RiskControl + risk:ImpactControl + → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl to recover from eventControl that removes Impact i.e. prevents it from materialising
    2024-05-19
    ContributorsHarshvardhan J. Pandit
    - + - + - + @@ -20146,7 +24542,7 @@

    Reduce Likelihood

    - @@ -20168,7 +24564,7 @@

    Reduce Likelihood

    - + @@ -20201,48 +24597,44 @@

    Reduce Likelihood

    -
    -

    Reduce Severity

    + + + +
    +

    Remuneration

    TermReduceLikelihoodRemoveSource Prefix risk
    LabelReduce LikelihoodRemove Source
    IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveSource
    Broader/Parent types risk:ReductionControl + risk:SourceControl → risk:RiskControl → dpv:RiskMitigationMeasure → dpv:TechnicalOrganisationalMeasure @@ -20157,7 +24553,7 @@

    Reduce Likelihood

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    DefinitionControl that reduces the likelihood of an eventControl that removes the risk source
    - + - + - + - + - - - - - + @@ -20251,7 +24643,7 @@

    Reduce Severity

    - + @@ -20264,18 +24656,21 @@

    Reduce Severity

    - + - + + + + - + - @@ -20284,47 +24679,43 @@

    Reduce Severity

    -
    -

    Reduction Control

    + + + +
    +

    Reputational Risk

    TermReduceSeverityRenumeration Prefix risk
    LabelReduce SeverityRemuneration
    IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#Renumeration
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ReductionControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20333,7 +24724,7 @@

    Reduction Control

    - + @@ -20344,17 +24735,14 @@

    Reduction Control

    - - - - + - @@ -20366,38 +24754,37 @@

    Reduction Control

    - - - -
    -

    Re-identification

    +
    +

    Requirements Bias

    TermReductionControlReputationalRisk Prefix risk
    LabelReduction ControlReputational Risk
    IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#ReputationalRisk
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that reduces the likelihood or severity of an eventRisks and issues that affect the reputation of the organisation
    Date Created2024-05-19
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -20411,31 +24798,31 @@

    Re-identification

    - + - + - + + + + - + - - - - + - + @@ -20453,23 +24840,23 @@

    Re-identification

    -
    -

    Religious Discrimination

    +
    +

    Reverse Discrimination

    TermReidentificationRequirementsBias Prefix risk
    LabelRe-identificationRequirements Bias
    IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#RequirementsBias
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Re-identificationBias that occurs in or during requirements creation
    Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentificationRequirements bias also represents occasions for the human cognitive biases to manifest
    Source
    Date Created2022-08-192024-09-13
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + @@ -20482,11 +24869,7 @@

    Religious Discrimination

    - - @@ -20500,7 +24883,7 @@

    Religious Discrimination

    - + @@ -20530,47 +24913,45 @@

    Religious Discrimination

    -
    -

    Remedy Control

    + + + +
    +

    Reward

    TermReligiousDiscriminationReverseDiscrimination Prefix risk
    LabelReligious DiscriminationReverse Discrimination
    IRIhttps://w3id.org/dpv/risk#ReligiousDiscriminationhttps://w3id.org/dpv/risk#ReverseDiscrimination
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination based on a person's religious beliefs or practicesDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality
    - + - + - + - + - - - - - + @@ -20579,7 +24960,7 @@

    Remedy Control

    - + @@ -20592,15 +24973,21 @@

    Remedy Control

    - + - - + + + + + + + + - @@ -20609,48 +24996,44 @@

    Remedy Control

    -
    -

    Remove Consequence

    + + + +
    +

    Rights Denied

    TermRemedyControlReward Prefix risk
    LabelRemedy ControlReward
    IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#Reward
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Renumeration + → risk:FinancialImpact + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl to remedy consequences of eventSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
    Date Created2024-05-192024-04-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20659,31 +25042,104 @@

    Remove Consequence

    - + + + + + + + + + + + + + + + + + + + + +
    TermRemoveConsequenceRightsDenied Prefix risk
    LabelRemove ConsequenceRights Denied
    IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#RightsDenied
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Consequence i.e. prevents it from materialisingThe refusal or withholding or denial of the existence or applicability of rights
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + +
    +

    Rights Eroded

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - + + - - - - + + + + + + + + + + + + + + - @@ -20692,48 +25148,44 @@

    Remove Consequence

    -
    -

    Remove Impact

    + + + +
    +

    Rights Exercise Prevented

    TermRightsErodedPrefixrisk
    LabelRights Eroded
    IRIhttps://w3id.org/dpv/risk#RightsEroded
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept +
    Date Created2024-05-19DefinitionThe gradual weakening or reduction of the scope and protection of rights
    ContributorsHarshvardhan J. Pandit
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20742,9 +25194,12 @@

    Remove Impact

    - + - + + + + @@ -20755,18 +25210,21 @@

    Remove Impact

    - + - + + + + - + - @@ -20775,48 +25233,43 @@

    Remove Impact

    -
    -

    Remove Source

    + + + +
    +

    Rights Impact

    TermRemoveImpactRightsExercisePrevented Prefix risk
    LabelRemove ImpactRights Exercise Prevented
    IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevented
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes Impact i.e. prevents it from materialisingActions or measures that prevent an individual or group from exercising their legal rights.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-05-192022-08-18
    Date Modified2024-08-16
    ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - - - - - + @@ -20825,22 +25278,31 @@

    Remove Source

    - + - + + + + - + + + + - + - + + + + @@ -20849,7 +25311,7 @@

    Remove Source

    - @@ -20861,23 +25323,23 @@

    Remove Source

    -
    -

    Remuneration

    +
    +

    Rights Limited

    TermRemoveSourceRightsImpact Prefix risk
    LabelRemove SourceRights Impact
    IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
    Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRiskConcept + → dpv:RiskConcept
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that removes the risk sourceConcept representing Impact to Rights
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created2024-05-192022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-CONTROLS in RISK + section RISK-TAXONOMY in RISK
    - + - + - + @@ -20889,7 +25351,8 @@

    Remuneration

    - @@ -20903,9 +25366,12 @@

    Remuneration

    - + - + + + + @@ -20916,7 +25382,7 @@

    Remuneration

    - + @@ -20942,23 +25408,23 @@

    Remuneration

    -
    -

    Reputational Risk

    +
    +

    Rights Obstructed

    TermRenumerationRightsLimited Prefix risk
    LabelRemunerationRights Limited
    IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimited
    Broader/Parent types risk:FinancialImpact + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or provides renumeration which is in monetary or financial formA limitation or restrictions on the scope or exercise of rights
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-04-142022-08-18
    Date Modified
    - + - + - + @@ -20970,7 +25436,9 @@

    Reputational Risk

    - @@ -20983,9 +25451,12 @@

    Reputational Risk

    - + - + + + + @@ -21013,37 +25484,37 @@

    Reputational Risk

    -
    -

    Requirements Bias

    +
    +

    Rights Unfulfilled

    TermReputationalRiskRightsObstructed Prefix risk
    LabelReputational RiskRights Obstructed
    IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsObstructed
    Broader/Parent types dpv:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionRisks and issues that affect the reputation of the organisationInterference with or blocking of the exercise of rights
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    - + - + - + - + - @@ -21056,32 +25527,23 @@

    Requirements Bias

    - + - + - - - - + - - - - + - - - - + @@ -21098,40 +25560,36 @@

    Requirements Bias

    -
    -

    Reverse Discrimination

    +
    +

    Rights Violated

    TermRequirementsBiasRightsUnfulfilled Prefix risk
    LabelRequirements BiasRights Unfulfilled
    IRIhttps://w3id.org/dpv/risk#RequirementsBiashttps://w3id.org/dpv/risk#RightsUnfulfilled
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:RightsImpact + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs in or during requirements creationFailure to meet or complete the fulfilment of rights
    Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifestHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-09-13
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - - - @@ -21145,9 +25603,12 @@

    Reverse Discrimination

    - + - + + + + @@ -21158,10 +25619,16 @@

    Reverse Discrimination

    - + - - + + + + + + + + @@ -21172,43 +25639,42 @@

    Reverse Discrimination

    TermReverseDiscriminationRightsViolated Prefix risk
    LabelReverse DiscriminationRights Violated
    IRIhttps://w3id.org/dpv/risk#ReverseDiscriminationhttps://w3id.org/dpv/risk#RightsViolated
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Discrimination - → risk:SocietalRisk + risk:RightsImpact + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionDiscrimination against members of a majority or historically dominant group, often in the context of efforts to promote equalityThe infringement or breach of rights in a manner that constitues a 'violation' of those rights
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2024-09-302022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    + + + + - - - - -
    -

    Reward

    +
    +

    Risk Analysis

    - + - + - + - + - @@ -21221,34 +25687,34 @@

    Reward

    - + - + + + + - + - - - - + - + - @@ -21256,41 +25722,35 @@

    Reward

    - - - - -
    -

    Erosion of Rights

    +
    +

    Risk Assessment

    TermRewardRiskAnalysis Prefix risk
    LabelRewardRisk Analysis
    IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:Renumeration - → risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
    SourceIEC 31010:2019
    Date Created2024-04-142022-08-18
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21303,28 +25763,31 @@

    Erosion of Rights

    - + - - - - + - + + + + - + + + + - @@ -21332,45 +25795,46 @@

    Erosion of Rights

    - - - - -
    -

    Obstruction of Rights

    +
    +

    Risk Control

    TermRightErodedRiskAssessment Prefix risk
    LabelErosion of RightsRisk Assessment
    IRIhttps://w3id.org/dpv/risk#RightErodedhttps://w3id.org/dpv/risk#RiskAssessment
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
    DefinitionThe gradual weakening or reduction of the scope and protection of rightsAssessment of risk involving its identification, analysis, and evaluation
    Usage NoteErosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-02-14
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - - + + + + @@ -21379,13 +25843,13 @@

    Obstruction of Rights

    - + - - - - + + + + @@ -21393,14 +25857,17 @@

    Obstruction of Rights

    - + + + + - @@ -21408,42 +25875,33 @@

    Obstruction of Rights

    - - - - -
    -

    Denial of Rights

    +
    +

    Risk Management

    TermRightObstructedRiskControl Prefix risk
    LabelObstruction of RightsRisk Control
    IRIhttps://w3id.org/dpv/risk#RightObstructedhttps://w3id.org/dpv/risk#RiskControl
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
    Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
    DefinitionInterference with or blocking of the exercise of rightsControl that modifies risk
    Usage NoteIn obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-19
    See More: section RISK-TAXONOMY in RISK + section RISK-CONTROLS in DEX
    - + - + - + - + - - - + @@ -21455,28 +25913,31 @@

    Denial of Rights

    - + - - - - + - + + + + - + + + + - @@ -21485,40 +25946,36 @@

    Denial of Rights

    - - - -
    -

    Prevent Exercising of Rights

    +
    +

    Risk Matrix

    TermRightsDenialRiskManagement Prefix risk
    LabelDenial of RightsRisk Management
    IRIhttps://w3id.org/dpv/risk#RightsDenialhttps://w3id.org/dpv/risk#RiskManagement
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept -
    DefinitionThe refusal or withholding or denial of the existence or applicability of rightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
    Usage NoteThe denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Source
    Date Created2024-06-12
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21531,37 +25988,34 @@

    Prevent Exercising of Rights

    - + - - - - + - + + + + - + - - - - + - + - @@ -21570,39 +26024,37 @@

    Prevent Exercising of Rights

    - - - -
    -

    Impact to Rights

    +
    +

    Risk Matrix 3x3

    TermRightsExercisePreventionRiskMatrix Prefix risk
    LabelPrevent Exercising of RightsRisk Matrix
    IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskMatrix
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAssessment
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
    DefinitionActions or measures that prevent an individual or group from exercising their legal rights.Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
    Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceIEC 31010:2019
    Date Created2022-08-182024-02-14
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - + - + - + - + - @@ -21615,20 +26067,14 @@

    Impact to Rights

    - + - - - - + - - - - + @@ -21636,10 +26082,7 @@

    Impact to Rights

    - - - - + @@ -21648,7 +26091,7 @@

    Impact to Rights

    - @@ -21657,40 +26100,37 @@

    Impact to Rights

    - - - -
    -

    Limitation of Rights

    +
    +

    Risk Matrix 5x5

    TermRightsImpactRiskMatrix3x3 Prefix risk
    LabelImpact to RightsRisk Matrix 3x3
    IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskMatrix3x3
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionSomething that acts as or causes Impact to RightsA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
    Usage NoteThis concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21703,12 +26143,9 @@

    Limitation of Rights

    - + - - - - + @@ -21719,21 +26156,18 @@

    Limitation of Rights

    - + - - - - + - + - @@ -21742,40 +26176,37 @@

    Limitation of Rights

    - - - -
    -

    Unfulfilment of Rights

    +
    +

    Risk Matrix 7x7

    TermRightsLimitationRiskMatrix5x5 Prefix risk
    LabelLimitation of RightsRisk Matrix 5x5
    IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskMatrix5x5
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionA limitation or restrictions on the scope or exercise of rightsA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
    Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182022-08-17
    Date Modified2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -21788,12 +26219,9 @@

    Unfulfilment of Rights

    - + - - - - + @@ -21802,14 +26230,20 @@

    Unfulfilment of Rights

    - + + + + - + + + + - @@ -21817,45 +26251,43 @@

    Unfulfilment of Rights

    - - - - -
    -

    Violation of Rights

    +
    +

    Risk Source

    TermRightsUnfulfilledRiskMatrix7x7 Prefix risk
    LabelUnfulfilment of RightsRisk Matrix 7x7
    IRIhttps://w3id.org/dpv/risk#RightsUnfulfilledhttps://w3id.org/dpv/risk#RiskMatrix7x7
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionFailure to meet or complete the fulfilment of rightsA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
    Usage NoteHere unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - + + + + @@ -21864,12 +26296,9 @@

    Violation of Rights

    - + - - - - + @@ -21880,61 +26309,57 @@

    Violation of Rights

    - + - - - - + -
    TermRightsViolationRiskSource Prefix risk
    LabelViolation of RightsRisk Source
    IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskSource
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept
    Broader/Parent types risk:RightsImpact - → risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskConcept
    Object of relation risk:hasRiskSource +
    DefinitionThe infringement or breach of rights in a manner that constitues a 'violation' of those rightsThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
    Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right
    Date Created2022-08-182024-02-14
    Date Modified 2024-08-16
    ContributorsGeorg P. Krog, Harshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK + section CORE in RISK
    - - - - -
    -

    Risk Analysis

    + +
    +

    Low Risk (RM3x3 S:1 L:1)

    - + - + - + - + - @@ -21948,23 +26373,20 @@

    Risk Analysis

    - + - - - - + - + @@ -21975,7 +26397,7 @@

    Risk Analysis

    - @@ -21983,35 +26405,39 @@

    Risk Analysis

    -
    -

    Risk Assessment

    + +
    +

    Low Risk (RM3x3 S:1 L:2)

    TermRiskAnalysisRM3x3S1L1 Prefix risk
    LabelRisk AnalysisLow Risk (RM3x3 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RM3x3S1L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    SourceIEC 31010:2019
    Date Created2022-08-182022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22024,31 +26450,31 @@

    Risk Assessment

    - + - - - - + - + - + + + + - @@ -22056,46 +26482,43 @@

    Risk Assessment

    -
    -

    Risk Control

    + +
    +

    Moderate Risk (RM3x3 S:1 L:3)

    TermRiskAssessmentRM3x3S1L2 Prefix risk
    LabelRisk AssessmentLow Risk (RM3x3 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RM3x3S1L2
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskManagement + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    DefinitionAssessment of risk involving its identification, analysis, and evaluationNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
    Source
    Date Created2024-02-142022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - - - - - + @@ -22104,13 +26527,10 @@

    Risk Control

    - + - - - @@ -22120,15 +26540,18 @@

    Risk Control

    - + - + + + + - @@ -22136,33 +26559,40 @@

    Risk Control

    -
    -

    Risk Management

    + +
    +

    Low Risk (RM3x3 S:2 L:1)

    TermRiskControlRM3x3S1L3 Prefix risk
    LabelRisk ControlModerate Risk (RM3x3 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RM3x3S1L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
    DefinitionControl that modifies riskNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
    Date Created2024-05-192022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
    - + - + - + - + - + + + @@ -22174,31 +26604,31 @@

    Risk Management

    - + - - - - + - + - + + + + - @@ -22207,35 +26637,37 @@

    Risk Management

    -
    -

    Risk Matrix

    +
    +

    Moderate Risk (RM3x3 S:2 L:2)

    TermRiskManagementRM3x3S2L1 Prefix risk
    LabelRisk ManagementLow Risk (RM3x3 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RM3x3S2L1
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
    Source
    Date Created2024-06-122022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + - + - @@ -22249,23 +26681,20 @@

    Risk Matrix

    - + - - - - + - + @@ -22276,7 +26705,7 @@

    Risk Matrix

    - @@ -22285,23 +26714,23 @@

    Risk Matrix

    -
    -

    Risk Matrix 3x3

    +
    +

    High Risk (RM3x3 S:2 L:3)

    TermRiskMatrixRM3x3S2L2 Prefix risk
    LabelRisk MatrixModerate Risk (RM3x3 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S2L2
    Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment → risk:RiskManagement
    DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    SourceIEC 31010:2019
    Date Created2024-02-142022-08-17
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22313,7 +26742,8 @@

    Risk Matrix 3x3

    - @@ -22328,7 +26758,7 @@

    Risk Matrix 3x3

    - + @@ -22361,23 +26791,23 @@

    Risk Matrix 3x3

    -
    -

    Risk Matrix 5x5

    +
    +

    Moderate Risk (RM3x3 S:3 L:1)

    TermRiskMatrix3x3RM3x3S2L3 Prefix risk
    LabelRisk Matrix 3x3High Risk (RM3x3 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S2L3
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -22389,7 +26819,8 @@

    Risk Matrix 5x5

    - @@ -22404,7 +26835,7 @@

    Risk Matrix 5x5

    - + @@ -22437,23 +26868,23 @@

    Risk Matrix 5x5

    -
    -

    Risk Matrix 7x7

    +
    +

    High Risk (RM3x3 S:3 L:2)

    TermRiskMatrix5x5RM3x3S3L1 Prefix risk
    LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S3L1
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -22465,7 +26896,8 @@

    Risk Matrix 7x7

    - @@ -22480,7 +26912,7 @@

    Risk Matrix 7x7

    - + @@ -22512,43 +26944,43 @@

    Risk Matrix 7x7

    -
    -

    Risk Source

    + +
    +

    High Risk (RM3x3 S:3 L:3)

    TermRiskMatrix7x7RM3x3S3L2 Prefix risk
    LabelRisk Matrix 7x7High Risk (RM3x3 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S3L2
    Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement
    DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + - + - - - - - + @@ -22557,7 +26989,7 @@

    Risk Source

    - + @@ -22570,18 +27002,18 @@

    Risk Source

    - + + - - - - + + + - @@ -22590,23 +27022,23 @@

    Risk Source

    -
    -

    Low Risk (RM3x3 S:1 L:1)

    +
    +

    Very Low Risk (RM5x5 S:1 L:1)

    TermRiskSourceRM3x3S3L3 Prefix risk
    LabelRisk SourceHigh Risk (RM3x3 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S3L3
    Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
    Object of relation risk:hasRiskSource -
    DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
    Date Created2024-02-142022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section CORE in RISK + section RISK-MATRIX in RISK
    - + - + - + @@ -22618,7 +27050,7 @@

    Low Risk (RM3x3 S:1 L:1)

    - - + @@ -22667,23 +27099,23 @@

    Low Risk (RM3x3 S:1 L:1)

    -
    -

    Low Risk (RM3x3 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:1 L:2)

    TermRM3x3S1L1RM5x5S1L1 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:1)Very Low Risk (RM5x5 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM5x5S1L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22634,7 +27066,7 @@

    Low Risk (RM3x3 S:1 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -22695,7 +27127,7 @@

    Low Risk (RM3x3 S:1 L:2)

    - - + @@ -22744,23 +27176,23 @@

    Low Risk (RM3x3 S:1 L:2)

    -
    -

    Moderate Risk (RM3x3 S:1 L:3)

    +
    +

    Very Low Risk (RM5x5 S:1 L:3)

    TermRM3x3S1L2RM5x5S1L2 Prefix risk
    LabelLow Risk (RM3x3 S:1 L:2)Very Low Risk (RM5x5 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM5x5S1L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22711,7 +27143,7 @@

    Low Risk (RM3x3 S:1 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -22772,7 +27204,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    - - + @@ -22821,23 +27253,23 @@

    Moderate Risk (RM3x3 S:1 L:3)

    -
    -

    Low Risk (RM3x3 S:2 L:1)

    +
    +

    Low Risk (RM5x5 S:1 L:4)

    TermRM3x3S1L3RM5x5S1L3 Prefix risk
    LabelModerate Risk (RM3x3 S:1 L:3)Very Low Risk (RM5x5 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM5x5S1L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22788,7 +27220,7 @@

    Moderate Risk (RM3x3 S:1 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -22849,7 +27281,7 @@

    Low Risk (RM3x3 S:2 L:1)

    - - + @@ -22898,23 +27330,23 @@

    Low Risk (RM3x3 S:2 L:1)

    -
    -

    Moderate Risk (RM3x3 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:1 L:5)

    TermRM3x3S2L1RM5x5S1L4 Prefix risk
    LabelLow Risk (RM3x3 S:2 L:1)Low Risk (RM5x5 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM5x5S1L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22865,7 +27297,7 @@

    Low Risk (RM3x3 S:2 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -22926,7 +27358,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    - - + @@ -22975,23 +27407,23 @@

    Moderate Risk (RM3x3 S:2 L:2)

    -
    -

    High Risk (RM3x3 S:2 L:3)

    +
    +

    Very Low Risk (RM5x5 S:2 L:1)

    TermRM3x3S2L2RM5x5S1L5 Prefix risk
    LabelModerate Risk (RM3x3 S:2 L:2)Low Risk (RM5x5 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L5
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -22942,7 +27374,7 @@

    Moderate Risk (RM3x3 S:2 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
    - + - + - + @@ -23003,7 +27435,7 @@

    High Risk (RM3x3 S:2 L:3)

    - - + @@ -23052,23 +27484,23 @@

    High Risk (RM3x3 S:2 L:3)

    -
    -

    Moderate Risk (RM3x3 S:3 L:1)

    +
    +

    Low Risk (RM5x5 S:2 L:2)

    TermRM3x3S2L3RM5x5S2L1 Prefix risk
    LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S2L1
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23019,7 +27451,7 @@

    High Risk (RM3x3 S:2 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23080,7 +27512,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    - - + @@ -23129,23 +27561,23 @@

    Moderate Risk (RM3x3 S:3 L:1)

    -
    -

    High Risk (RM3x3 S:3 L:2)

    +
    +

    Moderate Risk (RM5x5 S:2 L:3)

    TermRM3x3S3L1RM5x5S2L2 Prefix risk
    LabelModerate Risk (RM3x3 S:3 L:1)Low Risk (RM5x5 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S2L2
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23096,7 +27528,7 @@

    Moderate Risk (RM3x3 S:3 L:1)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -23157,7 +27589,7 @@

    High Risk (RM3x3 S:3 L:2)

    - - + @@ -23206,23 +27638,23 @@

    High Risk (RM3x3 S:3 L:2)

    -
    -

    High Risk (RM3x3 S:3 L:3)

    +
    +

    Moderate Risk (RM5x5 S:2 L:4)

    TermRM3x3S3L2RM5x5S2L3 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:2)Moderate Risk (RM5x5 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S2L3
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23173,7 +27605,7 @@

    High Risk (RM3x3 S:3 L:2)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23234,7 +27666,7 @@

    High Risk (RM3x3 S:3 L:3)

    - - + @@ -23283,23 +27715,23 @@

    High Risk (RM3x3 S:3 L:3)

    -
    -

    Very Low Risk (RM5x5 S:1 L:1)

    +
    +

    High Risk (RM5x5 S:2 L:5)

    TermRM3x3S3L3RM5x5S2L4 Prefix risk
    LabelHigh Risk (RM3x3 S:3 L:3)Moderate Risk (RM5x5 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S2L4
    Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -23250,7 +27682,7 @@

    High Risk (RM3x3 S:3 L:3)

    DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
    - + - + - + @@ -23327,7 +27759,7 @@

    Very Low Risk (RM5x5 S:1 L:1)

    - + @@ -23360,23 +27792,23 @@

    Very Low Risk (RM5x5 S:1 L:1)

    -
    -

    Very Low Risk (RM5x5 S:1 L:2)

    +
    +

    Very Low Risk (RM5x5 S:3 L:1)

    TermRM5x5S1L1RM5x5S2L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:1)High Risk (RM5x5 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -23404,7 +27836,7 @@

    Very Low Risk (RM5x5 S:1 L:2)

    - + @@ -23437,23 +27869,23 @@

    Very Low Risk (RM5x5 S:1 L:2)

    -
    -

    Very Low Risk (RM5x5 S:1 L:3)

    +
    +

    Moderate Risk (RM5x5 S:3 L:2)

    TermRM5x5S1L2RM5x5S3L1 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:2)Very Low Risk (RM5x5 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S3L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -23481,7 +27913,7 @@

    Very Low Risk (RM5x5 S:1 L:3)

    - + @@ -23514,23 +27946,23 @@

    Very Low Risk (RM5x5 S:1 L:3)

    -
    -

    Low Risk (RM5x5 S:1 L:4)

    +
    +

    Moderate Risk (RM5x5 S:3 L:3)

    TermRM5x5S1L3RM5x5S3L2 Prefix risk
    LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S3L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23558,7 +27990,7 @@

    Low Risk (RM5x5 S:1 L:4)

    - + @@ -23591,23 +28023,23 @@

    Low Risk (RM5x5 S:1 L:4)

    -
    -

    Low Risk (RM5x5 S:1 L:5)

    +
    +

    High Risk (RM5x5 S:3 L:4)

    TermRM5x5S1L4RM5x5S3L3 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S3L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -23635,7 +28067,7 @@

    Low Risk (RM5x5 S:1 L:5)

    - + @@ -23668,23 +28100,23 @@

    Low Risk (RM5x5 S:1 L:5)

    -
    -

    Very Low Risk (RM5x5 S:2 L:1)

    +
    +

    Very High Risk (RM5x5 S:3 L:5)

    TermRM5x5S1L5RM5x5S3L4 Prefix risk
    LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S3L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -23712,7 +28144,7 @@

    Very Low Risk (RM5x5 S:2 L:1)

    - + @@ -23745,23 +28177,23 @@

    Very Low Risk (RM5x5 S:2 L:1)

    -
    -

    Low Risk (RM5x5 S:2 L:2)

    +
    +

    Low Risk (RM5x5 S:4 L:1)

    TermRM5x5S2L1RM5x5S3L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:2 L:1)Very High Risk (RM5x5 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -23789,7 +28221,7 @@

    Low Risk (RM5x5 S:2 L:2)

    - + @@ -23822,23 +28254,23 @@

    Low Risk (RM5x5 S:2 L:2)

    -
    -

    Moderate Risk (RM5x5 S:2 L:3)

    +
    +

    Moderate Risk (RM5x5 S:4 L:2)

    TermRM5x5S2L2RM5x5S4L1 Prefix risk
    LabelLow Risk (RM5x5 S:2 L:2)Low Risk (RM5x5 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S4L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -23866,7 +28298,7 @@

    Moderate Risk (RM5x5 S:2 L:3)

    - + @@ -23899,23 +28331,23 @@

    Moderate Risk (RM5x5 S:2 L:3)

    -
    -

    Moderate Risk (RM5x5 S:2 L:4)

    +
    +

    High Risk (RM5x5 S:4 L:3)

    TermRM5x5S2L3RM5x5S4L2 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S4L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -23943,7 +28375,7 @@

    Moderate Risk (RM5x5 S:2 L:4)

    - + @@ -23976,23 +28408,23 @@

    Moderate Risk (RM5x5 S:2 L:4)

    -
    -

    High Risk (RM5x5 S:2 L:5)

    +
    +

    Very High Risk (RM5x5 S:4 L:4)

    TermRM5x5S2L4RM5x5S4L3 Prefix risk
    LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S4L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24020,7 +28452,7 @@

    High Risk (RM5x5 S:2 L:5)

    - + @@ -24053,23 +28485,23 @@

    High Risk (RM5x5 S:2 L:5)

    -
    -

    Very Low Risk (RM5x5 S:3 L:1)

    +
    +

    Very High Risk (RM5x5 S:4 L:5)

    TermRM5x5S2L5RM5x5S4L4 Prefix risk
    LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S4L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24097,7 +28529,7 @@

    Very Low Risk (RM5x5 S:3 L:1)

    - + @@ -24130,23 +28562,23 @@

    Very Low Risk (RM5x5 S:3 L:1)

    -
    -

    Moderate Risk (RM5x5 S:3 L:2)

    +
    +

    Low Risk (RM5x5 S:5 L:1)

    TermRM5x5S3L1RM5x5S4L5 Prefix risk
    LabelVery Low Risk (RM5x5 S:3 L:1)Very High Risk (RM5x5 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24174,7 +28606,7 @@

    Moderate Risk (RM5x5 S:3 L:2)

    - + @@ -24207,23 +28639,23 @@

    Moderate Risk (RM5x5 S:3 L:2)

    -
    -

    Moderate Risk (RM5x5 S:3 L:3)

    +
    +

    High Risk (RM5x5 S:5 L:2)

    TermRM5x5S3L2RM5x5S5L1 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:2)Low Risk (RM5x5 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S5L1
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -24251,7 +28683,7 @@

    Moderate Risk (RM5x5 S:3 L:3)

    - + @@ -24284,23 +28716,23 @@

    Moderate Risk (RM5x5 S:3 L:3)

    -
    -

    High Risk (RM5x5 S:3 L:4)

    +
    +

    High Risk (RM5x5 S:5 L:3)

    TermRM5x5S3L3RM5x5S5L2 Prefix risk
    LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S5L2
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -24328,7 +28760,7 @@

    High Risk (RM5x5 S:3 L:4)

    - + @@ -24361,23 +28793,23 @@

    High Risk (RM5x5 S:3 L:4)

    -
    -

    Very High Risk (RM5x5 S:3 L:5)

    +
    +

    Very High Risk (RM5x5 S:5 L:4)

    TermRM5x5S3L4RM5x5S5L3 Prefix risk
    LabelHigh Risk (RM5x5 S:3 L:4)High Risk (RM5x5 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S5L3
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -24405,7 +28837,7 @@

    Very High Risk (RM5x5 S:3 L:5)

    - + @@ -24438,23 +28870,23 @@

    Very High Risk (RM5x5 S:3 L:5)

    -
    -

    Low Risk (RM5x5 S:4 L:1)

    +
    +

    Very High Risk (RM5x5 S:5 L:5)

    TermRM5x5S3L5RM5x5S5L4 Prefix risk
    LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S5L4
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -24482,7 +28914,7 @@

    Low Risk (RM5x5 S:4 L:1)

    - + @@ -24515,23 +28947,23 @@

    Low Risk (RM5x5 S:4 L:1)

    -
    -

    Moderate Risk (RM5x5 S:4 L:2)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:1)

    TermRM5x5S4L1RM5x5S5L5 Prefix risk
    LabelLow Risk (RM5x5 S:4 L:1)Very High Risk (RM5x5 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L5
    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -24543,7 +28975,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    - - + @@ -24592,23 +29024,23 @@

    Moderate Risk (RM5x5 S:4 L:2)

    -
    -

    High Risk (RM5x5 S:4 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:2)

    TermRM5x5S4L2RM7x7S1L1 Prefix risk
    LabelModerate Risk (RM5x5 S:4 L:2)Extremely Low Risk (RM7x7 S:1 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM7x7S1L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24559,7 +28991,7 @@

    Moderate Risk (RM5x5 S:4 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -24620,7 +29052,7 @@

    High Risk (RM5x5 S:4 L:3)

    - - + @@ -24669,23 +29101,23 @@

    High Risk (RM5x5 S:4 L:3)

    -
    -

    Very High Risk (RM5x5 S:4 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:1 L:3)

    TermRM5x5S4L3RM7x7S1L2 Prefix risk
    LabelHigh Risk (RM5x5 S:4 L:3)Extremely Low Risk (RM7x7 S:1 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM7x7S1L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24636,7 +29068,7 @@

    High Risk (RM5x5 S:4 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -24697,7 +29129,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    - - + @@ -24746,23 +29178,23 @@

    Very High Risk (RM5x5 S:4 L:4)

    -
    -

    Very High Risk (RM5x5 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:1 L:4)

    TermRM5x5S4L4RM7x7S1L3 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:4)Extremely Low Risk (RM7x7 S:1 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM7x7S1L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24713,7 +29145,7 @@

    Very High Risk (RM5x5 S:4 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
    - + - + - + @@ -24774,7 +29206,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    - - + @@ -24823,23 +29255,23 @@

    Very High Risk (RM5x5 S:4 L:5)

    -
    -

    Low Risk (RM5x5 S:5 L:1)

    +
    +

    Very Low Risk (RM7x7 S:1 L:5)

    TermRM5x5S4L5RM7x7S1L4 Prefix risk
    LabelVery High Risk (RM5x5 S:4 L:5)Very Low Risk (RM7x7 S:1 L:4)
    IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM7x7S1L4
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24790,7 +29222,7 @@

    Very High Risk (RM5x5 S:4 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
    - + - + - + @@ -24851,7 +29283,7 @@

    Low Risk (RM5x5 S:5 L:1)

    - - + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermRM5x5S5L1RM7x7S1L5 Prefix risk
    LabelLow Risk (RM5x5 S:5 L:1)Very Low Risk (RM7x7 S:1 L:5)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L5
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24867,7 +29299,84 @@

    Low Risk (RM5x5 S:5 L:1)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK +
    +
    + + + +
    +

    Very Low Risk (RM7x7 S:1 L:6)

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -24900,23 +29409,23 @@

    Low Risk (RM5x5 S:5 L:1)

    -
    -

    High Risk (RM5x5 S:5 L:2)

    +
    +

    Low Risk (RM7x7 S:1 L:7)

    TermRM7x7S1L6Prefixrisk
    LabelVery Low Risk (RM7x7 S:1 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6
    Typerdfs:Class, skos:Concept, risk:RiskAnalysis
    Broader/Parent types risk:RiskMatrix7x7 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement +
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
    - + - + - + @@ -24928,7 +29437,7 @@

    High Risk (RM5x5 S:5 L:2)

    - - + @@ -24977,23 +29486,23 @@

    High Risk (RM5x5 S:5 L:2)

    -
    -

    High Risk (RM5x5 S:5 L:3)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:1)

    TermRM5x5S5L2RM7x7S1L7 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:2)Low Risk (RM7x7 S:1 L:7)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L7
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -24944,7 +29453,7 @@

    High Risk (RM5x5 S:5 L:2)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
    - + - + - + @@ -25005,7 +29514,7 @@

    High Risk (RM5x5 S:5 L:3)

    - - + @@ -25054,23 +29563,23 @@

    High Risk (RM5x5 S:5 L:3)

    -
    -

    Very High Risk (RM5x5 S:5 L:4)

    +
    +

    Extremely Low Risk (RM7x7 S:2 L:2)

    TermRM5x5S5L3RM7x7S2L1 Prefix risk
    LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S2L1
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25021,7 +29530,7 @@

    High Risk (RM5x5 S:5 L:3)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25082,7 +29591,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    - - + @@ -25131,23 +29640,23 @@

    Very High Risk (RM5x5 S:5 L:4)

    -
    -

    Very High Risk (RM5x5 S:5 L:5)

    +
    +

    Very Low Risk (RM7x7 S:2 L:3)

    TermRM5x5S5L4RM7x7S2L2 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S2L2
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25098,7 +29607,7 @@

    Very High Risk (RM5x5 S:5 L:4)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
    - + - + - + @@ -25159,7 +29668,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    - - + @@ -25208,23 +29717,23 @@

    Very High Risk (RM5x5 S:5 L:5)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:1)

    +
    +

    Low Risk (RM7x7 S:2 L:4)

    TermRM5x5S5L5RM7x7S2L3 Prefix risk
    LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:2 L:3)
    IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S2L3
    Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7 → risk:RiskMatrix → risk:RiskAssessment → risk:RiskManagement @@ -25175,7 +29684,7 @@

    Very High Risk (RM5x5 S:5 L:5)

    DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
    - + - + - + @@ -25252,7 +29761,7 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    - + @@ -25285,23 +29794,23 @@

    Extremely Low Risk (RM7x7 S:1 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:2)

    +
    +

    Low Risk (RM7x7 S:2 L:5)

    TermRM7x7S1L1RM7x7S2L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:1)Low Risk (RM7x7 S:2 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S2L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
    - + - + - + @@ -25329,7 +29838,7 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    - + @@ -25362,23 +29871,23 @@

    Extremely Low Risk (RM7x7 S:1 L:2)

    -
    -

    Extremely Low Risk (RM7x7 S:1 L:3)

    +
    +

    Moderate Risk (RM7x7 S:2 L:6)

    TermRM7x7S1L2RM7x7S2L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:2 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S2L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
    - + - + - + @@ -25406,7 +29915,7 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    - + @@ -25439,23 +29948,23 @@

    Extremely Low Risk (RM7x7 S:1 L:3)

    -
    -

    Very Low Risk (RM7x7 S:1 L:4)

    +
    +

    Moderate Risk (RM7x7 S:2 L:7)

    TermRM7x7S1L3RM7x7S2L6 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:1 L:3)Moderate Risk (RM7x7 S:2 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
    - + - + - + @@ -25483,7 +29992,7 @@

    Very Low Risk (RM7x7 S:1 L:4)

    - + @@ -25516,23 +30025,23 @@

    Very Low Risk (RM7x7 S:1 L:4)

    -
    -

    Very Low Risk (RM7x7 S:1 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:3 L:1)

    TermRM7x7S1L4RM7x7S2L7 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:4)Moderate Risk (RM7x7 S:2 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
    - + - + - + @@ -25560,7 +30069,7 @@

    Very Low Risk (RM7x7 S:1 L:5)

    - + @@ -25593,23 +30102,23 @@

    Very Low Risk (RM7x7 S:1 L:5)

    -
    -

    Very Low Risk (RM7x7 S:1 L:6)

    +
    +

    Very Low Risk (RM7x7 S:3 L:2)

    TermRM7x7S1L5RM7x7S3L1 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:5)Extremely Low Risk (RM7x7 S:3 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S3L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -25637,7 +30146,7 @@

    Very Low Risk (RM7x7 S:1 L:6)

    - + @@ -25670,23 +30179,23 @@

    Very Low Risk (RM7x7 S:1 L:6)

    -
    -

    Low Risk (RM7x7 S:1 L:7)

    +
    +

    Low Risk (RM7x7 S:3 L:3)

    TermRM7x7S1L6RM7x7S3L2 Prefix risk
    LabelVery Low Risk (RM7x7 S:1 L:6)Very Low Risk (RM7x7 S:3 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S3L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
    - + - + - + @@ -25714,7 +30223,7 @@

    Low Risk (RM7x7 S:1 L:7)

    - + @@ -25747,23 +30256,23 @@

    Low Risk (RM7x7 S:1 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:1)

    +
    +

    Moderate Risk (RM7x7 S:3 L:4)

    TermRM7x7S1L7RM7x7S3L3 Prefix risk
    LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:3 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S3L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
    - + - + - + @@ -25791,7 +30300,7 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    - + @@ -25824,23 +30333,23 @@

    Extremely Low Risk (RM7x7 S:2 L:1)

    -
    -

    Extremely Low Risk (RM7x7 S:2 L:2)

    +
    +

    High Risk (RM7x7 S:3 L:5)

    TermRM7x7S2L1RM7x7S3L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:3 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S3L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
    - + - + - + @@ -25868,7 +30377,7 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    - + @@ -25901,23 +30410,23 @@

    Extremely Low Risk (RM7x7 S:2 L:2)

    -
    -

    Very Low Risk (RM7x7 S:2 L:3)

    +
    +

    High Risk (RM7x7 S:3 L:6)

    TermRM7x7S2L2RM7x7S3L5 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:2 L:2)High Risk (RM7x7 S:3 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S3L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
    - + - + - + @@ -25945,7 +30454,7 @@

    Very Low Risk (RM7x7 S:2 L:3)

    - + @@ -25978,23 +30487,23 @@

    Very Low Risk (RM7x7 S:2 L:3)

    -
    -

    Low Risk (RM7x7 S:2 L:4)

    +
    +

    Very High Risk (RM7x7 S:3 L:7)

    TermRM7x7S2L3RM7x7S3L6 Prefix risk
    LabelVery Low Risk (RM7x7 S:2 L:3)High Risk (RM7x7 S:3 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
    - + - + - + @@ -26022,7 +30531,7 @@

    Low Risk (RM7x7 S:2 L:4)

    - + @@ -26055,23 +30564,23 @@

    Low Risk (RM7x7 S:2 L:4)

    -
    -

    Low Risk (RM7x7 S:2 L:5)

    +
    +

    Extremely Low Risk (RM7x7 S:4 L:1)

    TermRM7x7S2L4RM7x7S3L7 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:4)Very High Risk (RM7x7 S:3 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26099,7 +30608,7 @@

    Low Risk (RM7x7 S:2 L:5)

    - + @@ -26132,23 +30641,23 @@

    Low Risk (RM7x7 S:2 L:5)

    -
    -

    Moderate Risk (RM7x7 S:2 L:6)

    +
    +

    Low Risk (RM7x7 S:4 L:2)

    TermRM7x7S2L5RM7x7S4L1 Prefix risk
    LabelLow Risk (RM7x7 S:2 L:5)Extremely Low Risk (RM7x7 S:4 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S4L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
    - + - + - + @@ -26176,7 +30685,7 @@

    Moderate Risk (RM7x7 S:2 L:6)

    - + @@ -26209,23 +30718,23 @@

    Moderate Risk (RM7x7 S:2 L:6)

    -
    -

    Moderate Risk (RM7x7 S:2 L:7)

    +
    +

    Moderate Risk (RM7x7 S:4 L:3)

    TermRM7x7S2L6RM7x7S4L2 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:6)Low Risk (RM7x7 S:4 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S4L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26253,7 +30762,7 @@

    Moderate Risk (RM7x7 S:2 L:7)

    - + @@ -26286,23 +30795,23 @@

    Moderate Risk (RM7x7 S:2 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:3 L:1)

    +
    +

    High Risk (RM7x7 S:4 L:4)

    TermRM7x7S2L7RM7x7S4L3 Prefix risk
    LabelModerate Risk (RM7x7 S:2 L:7)Moderate Risk (RM7x7 S:4 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S4L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26330,7 +30839,7 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    - + @@ -26363,23 +30872,23 @@

    Extremely Low Risk (RM7x7 S:3 L:1)

    -
    -

    Very Low Risk (RM7x7 S:3 L:2)

    +
    +

    High Risk (RM7x7 S:4 L:5)

    TermRM7x7S3L1RM7x7S4L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:4 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S4L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26407,7 +30916,7 @@

    Very Low Risk (RM7x7 S:3 L:2)

    - + @@ -26440,23 +30949,23 @@

    Very Low Risk (RM7x7 S:3 L:2)

    -
    -

    Low Risk (RM7x7 S:3 L:3)

    +
    +

    Very High Risk (RM7x7 S:4 L:6)

    TermRM7x7S3L2RM7x7S4L5 Prefix risk
    LabelVery Low Risk (RM7x7 S:3 L:2)High Risk (RM7x7 S:4 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S4L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
    - + - + - + @@ -26484,7 +30993,7 @@

    Low Risk (RM7x7 S:3 L:3)

    - + @@ -26517,23 +31026,23 @@

    Low Risk (RM7x7 S:3 L:3)

    -
    -

    Moderate Risk (RM7x7 S:3 L:4)

    +
    +

    Very High Risk (RM7x7 S:4 L:7)

    TermRM7x7S3L3RM7x7S4L6 Prefix risk
    LabelLow Risk (RM7x7 S:3 L:3)Very High Risk (RM7x7 S:4 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
    - + - + - + @@ -26561,7 +31070,7 @@

    Moderate Risk (RM7x7 S:3 L:4)

    - + @@ -26594,23 +31103,23 @@

    Moderate Risk (RM7x7 S:3 L:4)

    -
    -

    High Risk (RM7x7 S:3 L:5)

    +
    +

    Very Low Risk (RM7x7 S:5 L:1)

    TermRM7x7S3L4RM7x7S4L7 Prefix risk
    LabelModerate Risk (RM7x7 S:3 L:4)Very High Risk (RM7x7 S:4 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
    - + - + - + @@ -26638,7 +31147,7 @@

    High Risk (RM7x7 S:3 L:5)

    - + @@ -26671,23 +31180,23 @@

    High Risk (RM7x7 S:3 L:5)

    -
    -

    High Risk (RM7x7 S:3 L:6)

    +
    +

    Low Risk (RM7x7 S:5 L:2)

    TermRM7x7S3L5RM7x7S5L1 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:5)Very Low Risk (RM7x7 S:5 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S5L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -26715,7 +31224,7 @@

    High Risk (RM7x7 S:3 L:6)

    - + @@ -26748,23 +31257,23 @@

    High Risk (RM7x7 S:3 L:6)

    -
    -

    Very High Risk (RM7x7 S:3 L:7)

    +
    +

    Moderate Risk (RM7x7 S:5 L:3)

    TermRM7x7S3L6RM7x7S5L2 Prefix risk
    LabelHigh Risk (RM7x7 S:3 L:6)Low Risk (RM7x7 S:5 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S5L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
    - + - + - + @@ -26792,7 +31301,7 @@

    Very High Risk (RM7x7 S:3 L:7)

    - + @@ -26825,23 +31334,23 @@

    Very High Risk (RM7x7 S:3 L:7)

    -
    -

    Extremely Low Risk (RM7x7 S:4 L:1)

    +
    +

    High Risk (RM7x7 S:5 L:4)

    TermRM7x7S3L7RM7x7S5L3 Prefix risk
    LabelVery High Risk (RM7x7 S:3 L:7)Moderate Risk (RM7x7 S:5 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S5L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
    - + - + - + @@ -26869,7 +31378,7 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    - + @@ -26902,23 +31411,23 @@

    Extremely Low Risk (RM7x7 S:4 L:1)

    -
    -

    Low Risk (RM7x7 S:4 L:2)

    +
    +

    Very High Risk (RM7x7 S:5 L:5)

    TermRM7x7S4L1RM7x7S5L4 Prefix risk
    LabelExtremely Low Risk (RM7x7 S:4 L:1)High Risk (RM7x7 S:5 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S5L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
    - + - + - + @@ -26946,7 +31455,7 @@

    Low Risk (RM7x7 S:4 L:2)

    - + @@ -26979,23 +31488,23 @@

    Low Risk (RM7x7 S:4 L:2)

    -
    -

    Moderate Risk (RM7x7 S:4 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:6)

    TermRM7x7S4L2RM7x7S5L5 Prefix risk
    LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:5 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S5L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27023,7 +31532,7 @@

    Moderate Risk (RM7x7 S:4 L:3)

    - + @@ -27056,23 +31565,23 @@

    Moderate Risk (RM7x7 S:4 L:3)

    -
    -

    High Risk (RM7x7 S:4 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:5 L:7)

    TermRM7x7S4L3RM7x7S5L6 Prefix risk
    LabelModerate Risk (RM7x7 S:4 L:3)Extremely High Risk (RM7x7 S:5 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27100,7 +31609,7 @@

    High Risk (RM7x7 S:4 L:4)

    - + @@ -27133,23 +31642,23 @@

    High Risk (RM7x7 S:4 L:4)

    -
    -

    High Risk (RM7x7 S:4 L:5)

    +
    +

    Very Low Risk (RM7x7 S:6 L:1)

    TermRM7x7S4L4RM7x7S5L7 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:4)Extremely High Risk (RM7x7 S:5 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27177,7 +31686,7 @@

    High Risk (RM7x7 S:4 L:5)

    - + @@ -27210,23 +31719,23 @@

    High Risk (RM7x7 S:4 L:5)

    -
    -

    Very High Risk (RM7x7 S:4 L:6)

    +
    +

    Moderate Risk (RM7x7 S:6 L:2)

    TermRM7x7S4L5RM7x7S6L1 Prefix risk
    LabelHigh Risk (RM7x7 S:4 L:5)Very Low Risk (RM7x7 S:6 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S6L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
    - + - + - + @@ -27254,7 +31763,7 @@

    Very High Risk (RM7x7 S:4 L:6)

    - + @@ -27287,23 +31796,23 @@

    Very High Risk (RM7x7 S:4 L:6)

    -
    -

    Very High Risk (RM7x7 S:4 L:7)

    +
    +

    High Risk (RM7x7 S:6 L:3)

    TermRM7x7S4L6RM7x7S6L2 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:6)Moderate Risk (RM7x7 S:6 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S6L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27331,7 +31840,7 @@

    Very High Risk (RM7x7 S:4 L:7)

    - + @@ -27364,23 +31873,23 @@

    Very High Risk (RM7x7 S:4 L:7)

    -
    -

    Very Low Risk (RM7x7 S:5 L:1)

    +
    +

    Very High Risk (RM7x7 S:6 L:4)

    TermRM7x7S4L7RM7x7S6L3 Prefix risk
    LabelVery High Risk (RM7x7 S:4 L:7)High Risk (RM7x7 S:6 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S6L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27408,7 +31917,7 @@

    Very Low Risk (RM7x7 S:5 L:1)

    - + @@ -27441,23 +31950,23 @@

    Very Low Risk (RM7x7 S:5 L:1)

    -
    -

    Low Risk (RM7x7 S:5 L:2)

    +
    +

    Very High Risk (RM7x7 S:6 L:5)

    TermRM7x7S5L1RM7x7S6L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:5 L:1)Very High Risk (RM7x7 S:6 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S6L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -27485,7 +31994,7 @@

    Low Risk (RM7x7 S:5 L:2)

    - + @@ -27518,23 +32027,23 @@

    Low Risk (RM7x7 S:5 L:2)

    -
    -

    Moderate Risk (RM7x7 S:5 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:6)

    TermRM7x7S5L2RM7x7S6L5 Prefix risk
    LabelLow Risk (RM7x7 S:5 L:2)Very High Risk (RM7x7 S:6 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S6L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
    - + - + - + @@ -27562,7 +32071,7 @@

    Moderate Risk (RM7x7 S:5 L:3)

    - + @@ -27595,23 +32104,23 @@

    Moderate Risk (RM7x7 S:5 L:3)

    -
    -

    High Risk (RM7x7 S:5 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:6 L:7)

    TermRM7x7S5L3RM7x7S6L6 Prefix risk
    LabelModerate Risk (RM7x7 S:5 L:3)Extremely High Risk (RM7x7 S:6 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -27639,7 +32148,7 @@

    High Risk (RM7x7 S:5 L:4)

    - + @@ -27672,23 +32181,23 @@

    High Risk (RM7x7 S:5 L:4)

    -
    -

    Very High Risk (RM7x7 S:5 L:5)

    +
    +

    Low Risk (RM7x7 S:7 L:1)

    TermRM7x7S5L4RM7x7S6L7 Prefix risk
    LabelHigh Risk (RM7x7 S:5 L:4)Extremely High Risk (RM7x7 S:6 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + @@ -27716,7 +32225,7 @@

    Very High Risk (RM7x7 S:5 L:5)

    - + @@ -27749,23 +32258,23 @@

    Very High Risk (RM7x7 S:5 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:6)

    +
    +

    Moderate Risk (RM7x7 S:7 L:2)

    TermRM7x7S5L5RM7x7S7L1 Prefix risk
    LabelVery High Risk (RM7x7 S:5 L:5)Low Risk (RM7x7 S:7 L:1)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S7L1
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
    - + - + - + @@ -27793,7 +32302,7 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    - + @@ -27826,23 +32335,23 @@

    Extremely High Risk (RM7x7 S:5 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:5 L:7)

    +
    +

    High Risk (RM7x7 S:7 L:3)

    TermRM7x7S5L6RM7x7S7L2 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:6)Moderate Risk (RM7x7 S:7 L:2)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S7L2
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
    - + - + - + @@ -27870,7 +32379,7 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    - + @@ -27903,23 +32412,23 @@

    Extremely High Risk (RM7x7 S:5 L:7)

    -
    -

    Very Low Risk (RM7x7 S:6 L:1)

    +
    +

    Very High Risk (RM7x7 S:7 L:4)

    TermRM7x7S5L7RM7x7S7L3 Prefix risk
    LabelExtremely High Risk (RM7x7 S:5 L:7)High Risk (RM7x7 S:7 L:3)
    IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S7L3
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
    - + - + - + @@ -27947,7 +32456,7 @@

    Very Low Risk (RM7x7 S:6 L:1)

    - + @@ -27980,23 +32489,23 @@

    Very Low Risk (RM7x7 S:6 L:1)

    -
    -

    Moderate Risk (RM7x7 S:6 L:2)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:5)

    TermRM7x7S6L1RM7x7S7L4 Prefix risk
    LabelVery Low Risk (RM7x7 S:6 L:1)Very High Risk (RM7x7 S:7 L:4)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S7L4
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
    - + - + - + @@ -28024,7 +32533,7 @@

    Moderate Risk (RM7x7 S:6 L:2)

    - + @@ -28057,23 +32566,23 @@

    Moderate Risk (RM7x7 S:6 L:2)

    -
    -

    High Risk (RM7x7 S:6 L:3)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:6)

    TermRM7x7S6L2RM7x7S7L5 Prefix risk
    LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:7 L:5)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S7L5
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
    - + - + - + @@ -28101,7 +32610,7 @@

    High Risk (RM7x7 S:6 L:3)

    - + @@ -28134,23 +32643,23 @@

    High Risk (RM7x7 S:6 L:3)

    -
    -

    Very High Risk (RM7x7 S:6 L:4)

    +
    +

    Extremely High Risk (RM7x7 S:7 L:7)

    TermRM7x7S6L3RM7x7S7L6 Prefix risk
    LabelHigh Risk (RM7x7 S:6 L:3)Extremely High Risk (RM7x7 S:7 L:6)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L6
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
    - + - + - + @@ -28178,7 +32687,7 @@

    Very High Risk (RM7x7 S:6 L:4)

    - + @@ -28211,38 +32720,41 @@

    Very High Risk (RM7x7 S:6 L:4)

    -
    -

    Very High Risk (RM7x7 S:6 L:5)

    + + + +
    +

    Rule-Based System Design

    TermRM7x7S6L4RM7x7S7L7 Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:4)Extremely High Risk (RM7x7 S:7 L:7)
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L7
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
    - + - + - + - + - @@ -28255,31 +32767,37 @@

    Very High Risk (RM7x7 S:6 L:5)

    - + - + + + + - + + + + - + - + - @@ -28288,38 +32806,43 @@

    Very High Risk (RM7x7 S:6 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:6)

    + + + + + +
    +

    Sabotage

    TermRM7x7S6L5RuleBasedSystemDesign Prefix risk
    LabelVery High Risk (RM7x7 S:6 L:5)Rule-Based System Design
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RuleBasedSystemDesign
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28332,14 +32855,17 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + - + + + + @@ -28347,7 +32873,10 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - + + + + @@ -28356,7 +32885,7 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    - @@ -28365,38 +32894,43 @@

    Extremely High Risk (RM7x7 S:6 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:6 L:7)

    + + + +
    +

    Sampling Bias

    TermRM7x7S6L6Sabotage Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:6)Sabotage
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#Sabotage
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighConcept representing Sabotage
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28409,31 +32943,34 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    - + - + + + + - + - + - @@ -28442,38 +32979,42 @@

    Extremely High Risk (RM7x7 S:6 L:7)

    -
    -

    Low Risk (RM7x7 S:7 L:1)

    + + + + +
    +

    Scam

    TermRM7x7S6L7SamplingBias Prefix risk
    LabelExtremely High Risk (RM7x7 S:6 L:7)Sampling Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#SamplingBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28486,14 +33027,17 @@

    Low Risk (RM7x7 S:7 L:1)

    - + - + + + + @@ -28501,7 +33045,10 @@

    Low Risk (RM7x7 S:7 L:1)

    - + + + + @@ -28510,7 +33057,7 @@

    Low Risk (RM7x7 S:7 L:1)

    - @@ -28519,38 +33066,42 @@

    Low Risk (RM7x7 S:7 L:1)

    -
    -

    Moderate Risk (RM7x7 S:7 L:2)

    + + + + + +
    +

    Security Attack

    TermRM7x7S7L1Scam Prefix risk
    LabelLow Risk (RM7x7 S:7 L:1)Scam
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#Scam
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:MaliciousActivity + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowConcept representing Scam
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28563,7 +33114,7 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - + @@ -28574,20 +33125,14 @@

    Moderate Risk (RM7x7 S:7 L:2)

    - - - - + - - - - + - @@ -28596,38 +33141,43 @@

    Moderate Risk (RM7x7 S:7 L:2)

    -
    -

    High Risk (RM7x7 S:7 L:3)

    + + + + + + +
    +

    Security Breach

    TermRM7x7S7L2SecurityAttack Prefix risk
    LabelModerate Risk (RM7x7 S:7 L:2)Security Attack
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#SecurityAttack
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateConcept representing an attack on security with the aim of undermining it
    Date Created2022-08-17
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28640,14 +33190,17 @@

    High Risk (RM7x7 S:7 L:3)

    - + - + + + + @@ -28655,7 +33208,10 @@

    High Risk (RM7x7 S:7 L:3)

    - + + + + @@ -28664,7 +33220,7 @@

    High Risk (RM7x7 S:7 L:3)

    - @@ -28673,38 +33229,42 @@

    High Risk (RM7x7 S:7 L:3)

    -
    -

    Very High Risk (RM7x7 S:7 L:4)

    + + + +
    +

    Selection Bias

    TermRM7x7S7L3SecurityBreach Prefix risk
    LabelHigh Risk (RM7x7 S:7 L:3)Security Breach
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#SecurityBreach
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighConcept representing Security Breach
    SourceISO/IEC 27005:2018
    Date Created 2022-08-17
    Date Modified2024-08-16
    Contributors Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28717,31 +33277,34 @@

    Very High Risk (RM7x7 S:7 L:4)

    - + - + + + + - + - + - @@ -28750,38 +33313,45 @@

    Very High Risk (RM7x7 S:7 L:4)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:5)

    + + + + + + + + +
    +

    Service Alternative Offered

    TermRM7x7S7L4SelectionBias Prefix risk
    LabelVery High Risk (RM7x7 S:7 L:4)Selection Bias
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#SelectionBias
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConcept
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
    Source
    Date Created2022-08-172024-09-13
    ContributorsHarshvardhan J. PanditDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28794,7 +33364,7 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + @@ -28807,18 +33377,15 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    - + - - - - + - @@ -28827,38 +33394,40 @@

    Extremely High Risk (RM7x7 S:7 L:5)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:6)

    + + + +
    +

    Service Cost Increased

    TermRM7x7S7L5ServiceAlternativeOffered Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:5)Service Alternative Offered
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#ServiceAlternativeOffered
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28871,7 +33440,7 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + @@ -28884,18 +33453,15 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    - + - - - - + - @@ -28904,38 +33470,40 @@

    Extremely High Risk (RM7x7 S:7 L:6)

    -
    -

    Extremely High Risk (RM7x7 S:7 L:7)

    + + + +
    +

    Service Denied

    TermRM7x7S7L6ServiceCostIncreased Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:6)Service Cost Increased
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#ServiceCostIncreased
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -28948,7 +33516,7 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + @@ -28961,18 +33529,15 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    - + - - - - + - @@ -28984,37 +33549,37 @@

    Extremely High Risk (RM7x7 S:7 L:7)

    -
    -

    Rule-Based System Design

    +
    +

    Service Limited

    TermRM7x7S7L7ServiceDenied Prefix risk
    LabelExtremely High Risk (RM7x7 S:7 L:7)Service Denied
    IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#ServiceDenied
    Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighStub
    Date Created2022-08-172024-10-21
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-MATRIX in RISK + section RISK-TAXONOMY in RISK
    - + - + - + - + - @@ -29027,32 +33592,23 @@

    Rule-Based System Design

    - + - - - - + - - - - + - + - - - - + @@ -29069,38 +33625,36 @@

    Rule-Based System Design

    - - -
    -

    Sabotage

    +
    +

    Service Not Provided

    TermRuleBasedSystemDesignServiceLimited Prefix risk
    LabelRule-Based System DesignService Limited
    IRIhttps://w3id.org/dpv/risk#RuleBasedSystemDesignhttps://w3id.org/dpv/risk#ServiceLimited
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:CognitiveBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs due to developer experience and expert advice having a significant influence on rule-based system designStub
    Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29114,32 +33668,23 @@

    Sabotage

    - + - - - - + - + - - - - - - - - + + @@ -29156,39 +33701,37 @@

    Sabotage

    -
    -

    Sampling Bias

    +
    +

    Service Partially Provided

    TermSabotageServiceNotProvided Prefix risk
    LabelSabotageService Not Provided
    IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#ServiceNotProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SabotageStub
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29201,29 +33744,23 @@

    Sampling Bias

    - + - - - - + - + - - - - + @@ -29240,37 +33777,36 @@

    Sampling Bias

    - -
    -

    Scam

    +
    +

    Service Provided

    TermSamplingBiasServicePartiallyProvided Prefix risk
    LabelSampling BiasService Partially Provided
    IRIhttps://w3id.org/dpv/risk#SamplingBiashttps://w3id.org/dpv/risk#ServicePartiallyProvided
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:SelectionBias - → risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when data records are not collected randomly from the intended populationStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    - + - + - + - + - @@ -29284,32 +33820,23 @@

    Scam

    - + - - - - + - + - - - - - - - - + + @@ -29326,37 +33853,36 @@

    Scam

    - - -
    -

    Security Attack

    +
    +

    Service Provision Delayed

    TermScamServiceProvided Prefix risk
    LabelScamService Provided
    IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#ServiceProvided
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:ConfidentialityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:MaliciousActivity - → risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes ScamStub
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29370,7 +33896,7 @@

    Security Attack

    - + @@ -29381,7 +33907,10 @@

    Security Attack

    - + + + + @@ -29400,38 +33929,111 @@

    Security Attack

    +
    +

    Service Quality Reduced

    +
    TermSecurityAttackServiceProvisionDelayed Prefix risk
    LabelSecurity AttackService Provision Delayed
    IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#ServiceProvisionDelayed
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ExternalSecurityThreat + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes an attack on security with the aim of undermining itStub
    Date Created2024-10-21
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceQualityReducedPrefixrisk
    LabelService Quality Reduced
    IRIhttps://w3id.org/dpv/risk#ServiceQualityReduced
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    -
    -

    Security Breach

    + + + + +
    +

    None

    - + - + - + - + - @@ -29445,32 +34047,23 @@

    Security Breach

    - + - - - - + - + - - - - - - - - + + @@ -29487,38 +34080,37 @@

    Security Breach

    -
    -

    Selection Bias

    +
    +

    Service Security Reduced

    TermSecurityBreachServiceRelatedConsequence Prefix risk
    LabelSecurity BreachNone
    IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ServiceRelatedConsequence
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:OperationalSecurityRisk + risk:OrganisationalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Security BreachA consequence related to the provision of a service
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    - + - + - + - + - @@ -29531,29 +34123,23 @@

    Selection Bias

    - + - - - - + - + - - - - + @@ -29570,6 +34156,77 @@

    Selection Bias

    +
    +

    Service Termination

    +
    TermSelectionBiasServiceSecurityReduced Prefix risk
    LabelSelection BiasService Security Reduced
    IRIhttps://w3id.org/dpv/risk#SelectionBiashttps://w3id.org/dpv/risk#ServiceSecurityReduced
    Typerdfs:Class, skos:Concept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource, risk:RiskConceptrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:StatisticalBias - → risk:DataBias - → risk:Bias - → risk:RiskConcept + risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept
    DefinitionBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distributionStub
    Source
    Date Created2024-09-132024-10-21
    ContributorsDaniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermServiceTerminationPrefixrisk
    LabelService Termination
    IRIhttps://w3id.org/dpv/risk#ServiceTermination
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk
    Broader/Parent types risk:ServiceRelatedConsequence + → risk:OrganisationalRiskConcept + → dpv:RiskConcept +
    DefinitionStub
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + @@ -29605,12 +34262,7 @@

    Sex Discrimination

    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29686,11 +34338,7 @@

    Sexism

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29767,6 +34415,8 @@

    Sexual Harassment

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29835,11 +34485,7 @@

    SexualOrientation Discrimination

    Broader/Parent types risk:Discrimination - → risk:RiskConcept - - Broader/Parent types - risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -29916,6 +34562,8 @@

    Sexual Violence

    Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept @@ -29928,7 +34576,7 @@

    Sexual Violence

    Definition - Something that acts as or causes Sexual Violence + Concept representing Sexual Violence @@ -30005,7 +34653,7 @@

    Share Risk

    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl @@ -30082,7 +34730,8 @@

    Simpson'S Paradox Bias

    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30162,7 +34811,8 @@

    Social Disadvantage

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30176,7 +34826,7 @@

    Social Disadvantage

    Definition - Something that acts as or causes Social Disadvantage + Concept representing Social Disadvantage @@ -30245,7 +34895,8 @@

    Societal Bias

    Broader/Parent types risk:CognitiveBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept @@ -30325,7 +34976,8 @@

    Societal Health & Safety

    Broader/Parent types - risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept @@ -30366,30 +35018,31 @@

    Societal Health & Safety

    -
    -

    Societal Risk

    + +
    +

    Societal Risk Concept

    - + - + - + - + @@ -30407,9 +35060,12 @@

    Societal Risk

    - + - + + + + @@ -30418,7 +35074,10 @@

    Societal Risk

    - + + + + @@ -30472,7 +35131,7 @@

    Source Control

    @@ -30551,6 +35210,7 @@

    Spoofing

    @@ -30564,7 +35224,7 @@

    Spoofing

    - + @@ -30636,7 +35296,8 @@

    Statistical Bias

    @@ -30718,6 +35379,7 @@

    System Failure

    @@ -30731,7 +35393,7 @@

    System Failure

    - + @@ -30777,37 +35439,124 @@

    System Failure

    - -
    -

    System Intrusion

    + +
    +

    System Intrusion

    +
    TermSocietalRiskSocietalRiskConcept Prefix risk
    LabelSocietal RiskSocietal Risk Concept
    IRIhttps://w3id.org/dpv/risk#SocietalRiskhttps://w3id.org/dpv/risk#SocietalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRiskrdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    DefinitionRisks and issues that affect or have the potential to affect society at large or specific groups in societyRisk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process
    Usage NoteSocietal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure
    Date Created2024-10-21
    Object of relation dpv:hasTechnicalOrganisationalMeasure, dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasControl
    Broader/Parent types risk:MaliciousActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes SpoofingConcept representing Spoofing
    Broader/Parent types risk:DataBias → risk:Bias - → risk:RiskConcept + → risk:TechnicalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System FailureConcept representing System Failure
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermSystemIntrusionPrefixrisk
    LabelSystem Intrusion
    IRIhttps://w3id.org/dpv/risk#SystemIntrusion
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack + → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept + → dpv:RiskConcept +
    DefinitionConcept representing System Intrusion
    SourceENISA Reference Incident Classification Taxonomy 2018
    Date Created2022-08-17
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + + + + +
    +

    System Malfunction

    - + - + - + - + - @@ -30821,16 +35570,19 @@

    System Intrusion

    - + - + + + + - + @@ -30864,36 +35616,35 @@

    System Intrusion

    -
    -

    System Malfunction

    +
    +

    Technical Risk Concept

    TermSystemIntrusionSystemMalfunction Prefix risk
    LabelSystem IntrusionSystem Malfunction
    IRIhttps://w3id.org/dpv/risk#SystemIntrusionhttps://w3id.org/dpv/risk#SystemMalfunction
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:ConfidentialityConcept, risk:IntegrityConcept, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:SecurityAttack - → risk:ExternalSecurityThreat + risk:OperationalSecurityRisk + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes System IntrusionConcept representing System Malfunction
    Usage NoteHere system refers to both hardware and software systems
    SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
    - + - + - + - + - @@ -30906,35 +35657,26 @@

    System Malfunction

    - + - + - - - - + - + - - - - - - - - + + @@ -30979,7 +35721,8 @@

    Terrorism

    - @@ -30993,7 +35736,7 @@

    Terrorism

    - + @@ -31218,12 +35961,7 @@

    Transphobia

    - - @@ -31303,6 +36041,7 @@

    Unauthorised Access to Premises

    @@ -31316,7 +36055,7 @@

    Unauthorised Access to Premises

    - + @@ -31390,6 +36129,7 @@

    Unauthorised Activity

    @@ -31403,7 +36143,7 @@

    Unauthorised Activity

    - + @@ -31465,6 +36205,7 @@

    Unauthorised Code Access

    @@ -31478,7 +36219,7 @@

    Unauthorised Code Access

    - + @@ -31551,6 +36292,7 @@

    Unauthorised Code Disclosure

    @@ -31564,7 +36306,7 @@

    Unauthorised Code Disclosure

    - + @@ -31637,6 +36379,7 @@

    Unauthorised Code Modification

    @@ -31650,7 +36393,7 @@

    Unauthorised Code Modification

    - + @@ -31723,6 +36466,7 @@

    Unauthorised Data Access

    @@ -31736,7 +36480,7 @@

    Unauthorised Data Access

    - + @@ -31809,6 +36553,7 @@

    Unauthorised Data Disclosure

    @@ -31822,7 +36567,7 @@

    Unauthorised Data Disclosure

    - + @@ -31895,6 +36640,7 @@

    Unauthorised Data Modification

    @@ -31908,7 +36654,7 @@

    Unauthorised Data Modification

    - + @@ -31981,6 +36727,7 @@

    Unauthorised Information Disclosure

    @@ -31994,7 +36741,7 @@

    Unauthorised Information Disclosure

    - + @@ -32067,6 +36814,7 @@

    Unauthorised Re-Identification

    @@ -32080,7 +36828,7 @@

    Unauthorised Re-Identification

    - + @@ -32150,6 +36898,7 @@

    Unauthorised Resource Use

    @@ -32163,7 +36912,7 @@

    Unauthorised Resource Use

    - + @@ -32237,6 +36986,7 @@

    Unauthorised System Access

    @@ -32250,7 +37000,7 @@

    Unauthorised System Access

    - + @@ -32323,6 +37073,7 @@

    Unauthorised System Modification

    @@ -32336,7 +37087,7 @@

    Unauthorised System Modification

    - + @@ -32410,6 +37161,7 @@

    Unwanted Code Deletion

    @@ -32423,7 +37175,7 @@

    Unwanted Code Deletion

    - + @@ -32497,6 +37249,7 @@

    Unwanted Data Deletion

    @@ -32510,7 +37263,7 @@

    Unwanted Data Deletion

    - + @@ -32583,6 +37336,7 @@

    Unwanted Disclosure of Data

    @@ -32596,7 +37350,7 @@

    Unwanted Disclosure of Data

    - + @@ -32665,7 +37419,8 @@

    User Risks

    - @@ -33251,7 +38006,9 @@

    Violating Code of Conduct

    - @@ -33264,7 +38021,7 @@

    Violating Code of Conduct

    - + @@ -33309,7 +38066,7 @@

    Violating Code of Conduct

    -

    Violation of Contractual Obligation

    +

    Violating Contractual Obligation

    TermSystemMalfunctionTechnicalRiskConcept Prefix risk
    LabelSystem MalfunctionTechnical Risk Concept
    IRIhttps://w3id.org/dpv/risk#SystemMalfunctionhttps://w3id.org/dpv/risk#TechnicalRiskConcept
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:AvailabilityConcept, risk:PotentialConsequence, risk:PotentialRisk, risk:PotentialRiskSourcerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:PotentialRiskSource
    Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
    DefinitionSomething that acts as or causes System MalfunctionRisk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process
    Usage NoteHere system refers to both hardware and software systemsTechnical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes
    SourceISO/IEC 27005:2018
    Date Created2022-08-172024-10-21
    Date Modified2024-08-16
    ContributorsHarshvardhan J. Pandit
    Broader/Parent types risk:SocietalRisk + risk:GroupRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes TerrorismConcept representing Terrorism
    Broader/Parent types risk:Sexism → risk:Discrimination - → risk:RiskConcept -
    Broader/Parent types risk:Sexism - → risk:Discrimination - → risk:SocietalRisk + → risk:SocietalRiskConcept → dpv:RiskConcept
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Access to PremisesConcept representing Unauthorised Access to Premises
    Broader/Parent types risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised ActivityConcept representing Unauthorised Activity
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code AccessConcept representing Unauthorised Code Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code DisclosureConcept representing Unauthorised Code Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Code ModificationConcept representing Unauthorised Code Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data AccessConcept representing Unauthorised Data Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data DisclosureConcept representing Unauthorised Data Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Data ModificationConcept representing Unauthorised Data Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Information DisclosureConcept representing Unauthorised Information Disclosure
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Re-IdentificationConcept representing Unauthorised Re-Identification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised Resource UseConcept representing Unauthorised Resource Use
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System AccessConcept representing Unauthorised System Access
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unauthorised System ModificationConcept representing Unauthorised System Modification
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Code DeletionConcept representing Unwanted Code Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Data DeletionConcept representing Unwanted Data Deletion
    Broader/Parent types risk:UnauthorisedActivity → risk:ExternalSecurityThreat + → risk:TechnicalRiskConcept → dpv:RiskConcept
    DefinitionSomething that acts as or causes Unwanted Disclosure of DataConcept representing Unwanted Disclosure of Data
    Broader/Parent types dpv:RiskConcept + risk:OrganisationalRiskConcept + → dpv:RiskConcept
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Code of ConductConcept representing Violation of Code of Conduct
    Usage Note
    @@ -33320,7 +38077,7 @@

    Violation of Contractual Obligation

    - + @@ -33336,7 +38093,15 @@

    Violation of Contractual Obligation

    - + + @@ -33349,7 +38114,7 @@

    Violation of Contractual Obligation

    - + @@ -33421,7 +38186,9 @@

    Violating Ethics Code

    - @@ -33434,7 +38201,7 @@

    Violating Ethics Code

    - + @@ -33479,7 +38246,7 @@

    Violating Ethics Code

    -

    Violation of Legal Obligations

    +

    Violating Legal Obligation

    LabelViolation of Contractual ObligationViolating Contractual Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Contractual ObligationsConcept representing Violation of Contractual Obligations
    Usage Note
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Ethics CodeConcept representing Violation of Ethics Code
    Usage Note
    @@ -33490,7 +38257,7 @@

    Violation of Legal Obligations

    - + @@ -33506,7 +38273,15 @@

    Violation of Legal Obligations

    - + + @@ -33519,7 +38294,7 @@

    Violation of Legal Obligations

    - + @@ -33563,6 +38338,81 @@

    Violation of Legal Obligations

    +
    +

    Violating Obligation

    +
    LabelViolation of Legal ObligationsViolating Legal Obligation
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Legal ObligationsConcept representing Violation of Legal Obligations
    Usage Note
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingObligationPrefixrisk
    LabelViolating Obligation
    IRIhttps://w3id.org/dpv/risk#ViolatingObligation
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +

    Violating Policy

    @@ -33591,7 +38441,9 @@

    Violating Policy

    - @@ -33604,7 +38456,7 @@

    Violating Policy

    - + @@ -33633,8 +38485,83 @@

    Violating Policy

    +
    +

    Violating Prohibition

    +
    Broader/Parent types risk:ViolatingObligation + risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes violation of policy which can be either internal or external policyConcept representing violation of policy which can be either internal or external policy
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermViolatingProhibitionPrefixrisk
    LabelViolating Prohibition
    IRIhttps://w3id.org/dpv/risk#ViolatingProhibition
    Typerdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk
    Broader/Parent types risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    DefinitionSomething that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract
    Date Created2024-10-21
    See More: section RISK-TAXONOMY in RISK +
    +
    + + + + +
    -

    Violation of Statutory Obligations

    +

    Violating Statutory Obligations

    @@ -33645,7 +38572,7 @@

    Violation of Statutory Obligations

    - + @@ -33661,7 +38588,15 @@

    Violation of Statutory Obligations

    - + + @@ -33674,7 +38609,7 @@

    Violation of Statutory Obligations

    - + @@ -33749,6 +38684,8 @@

    Violence against children

    @@ -33761,7 +38698,7 @@

    Violence against children

    - + @@ -34124,74 +39061,78 @@

    caused by threat

    -
    -

    caused by vulnerability

    -
    LabelViolation of Statutory ObligationsViolating Statutory Obligations
    IRI
    Broader/Parent types risk:ViolatingObligation + risk:LegalComplianceRisk + → risk:LegalRiskConcept + → dpv:RiskConcept +
    Broader/Parent types risk:ViolatingObligation + → risk:PolicyRisk + → risk:LegalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Violation of Statutory ObligationsConcept representing Violation of Statutory Obligations
    Usage Note Broader/Parent types risk:Harm → risk:IndividualRisk + → risk:SocietalRiskConcept + → dpv:RiskConcept
    DefinitionSomething that acts as or causes Child ViolenceConcept representing Child Violence
    Usage Note
    - - - - - - - - - - - - - - - - - - - - - - - +
    +

    caused by vulnerability

    +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    TermcausedByVulnerabilityPrefixrisk
    Labelcaused by vulnerability
    IRIhttps://w3id.org/dpv/risk#causedByVulnerability
    Typerdf:Property, skos:Concept
    Range includes risk:Vulnerability +
    DefinitionIndicates the associated context (subject) is caused by the indicated vulnerability (object)
    Date Created2024-02-14
    See More: section CORE in RISK +
    +
    + + - - - - - - Range includes - risk:Vulnerability - - - - - - Definition - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - - - - - - - - - - Date Created - 2024-02-14 - - - - - - - See More: - section CORE in RISK - - - - -
    @@ -34277,12 +39218,32 @@

    caused by vulnerability

    + + + + + + + + + + + + + + + + + + + + + + - - @@ -34568,6 +39529,18 @@

    exploits vulnerability

    + + + + + + + + + + + + @@ -34646,7 +39619,7 @@

    has control

    See More: - section CORE in RISK + section CORE in DEX @@ -34994,6 +39967,48 @@

    has vulnerability

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35107,6 +40122,7 @@

    has vulnerability

    +
    @@ -35497,6 +40513,61 @@

    is vulnerability of

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -35696,10 +40767,100 @@

    refers to risk

    - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36640,6 +41801,12 @@

    External

    + + + + + + @@ -36658,6 +41825,12 @@

    External

    + + + + + + @@ -36672,6 +41845,7 @@

    External

    + @@ -36690,6 +41864,17 @@

    External

    + + + + + + + + + + + @@ -36792,6 +41977,18 @@

    External

    + + + + + + + + + + + + @@ -36879,6 +42076,12 @@

    External

    + + + + + + @@ -36890,6 +42093,42 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -36961,6 +42200,7 @@

    External

    + @@ -37042,6 +42282,7 @@

    External

    + @@ -37075,12 +42316,36 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + @@ -37192,6 +42457,7 @@

    External

    + @@ -37210,6 +42476,11 @@

    External

    + + + + + @@ -37223,6 +42494,24 @@

    External

    + + + + + + + + + + + + + + + + + + @@ -37263,6 +42552,12 @@

    External

    + + + + + + @@ -37740,6 +43035,78 @@

    External

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -37770,6 +43137,7 @@

    External

    + @@ -37815,6 +43183,13 @@

    External

    + + + + + + + @@ -37992,6 +43367,16 @@

    External

    + + + + + + + + + + diff --git a/2.1-dev/risk/risk.jsonld b/2.1-dev/risk/risk.jsonld index 1c4564b40..f8b640d46 100644 --- a/2.1-dev/risk/risk.jsonld +++ b/2.1-dev/risk/risk.jsonld @@ -1,18 +1,34 @@ [ { - "@id": "https://w3id.org/dpv/risk#Racism", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0673a500160d458fb2189ffe9f6498fa" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -28,13 +44,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Prejudice or discrimination against people based on their race" + "@value": "Concept representing Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -45,66 +61,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Racism" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "_:N0673a500160d458fb2189ffe9f6498fa", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control to contain event" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Containment Control" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -114,13 +96,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -136,58 +117,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#CoverageBias", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -203,105 +174,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coverage Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@value": "Extremely High Severity" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonNormalityBias", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -316,13 +224,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -333,19 +235,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Normality Bias" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ @@ -367,7 +269,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N809a964650274e1ca9c544fb513732ef" + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -383,13 +285,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Concept representing Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -400,12 +302,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:N809a964650274e1ca9c544fb513732ef", + "@id": "_:Nafc45a6f571b450d9cd48ed31afeda57", "@type": [ "https://schema.org/WebPage" ], @@ -421,20 +323,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept", + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -442,11 +344,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -461,52 +358,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Concept" + "@value": "Technical Risk Concept" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" + "@value": "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonResponseBias", + "@id": "https://w3id.org/dpv/risk#LowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -522,90 +415,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Non-Response Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, { - "@value": "0.44,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "accepted" + "@value": "Level where Likelihood is Low" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@value": "Low Likelihood" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -620,7 +468,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -636,13 +484,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -653,47 +507,55 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" + "@value": "High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - N3 serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "_:Ndd18bed776ec45498b139828923f57f1" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -708,13 +570,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Risks and consequences regarding legal compliance and its violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -725,36 +587,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Legal Compliance Risk" } ] }, { - "@id": "_:Ndd18bed776ec45498b139828923f57f1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk#Transphobia", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -762,11 +612,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -775,43 +620,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Transphobia" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk#CustomerSupportLimited", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -827,73 +670,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Concept representing customer support to be limited" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "Customer Support Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#causedByThreat", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -907,38 +725,38 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -959,7 +777,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27" + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -975,13 +793,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Concept representing Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -992,40 +810,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "Lose of Opportunity" } ] }, { - "@id": "_:Nbcbd970eb1bf49829dfba4ba5d276f27", + "@id": "_:Nff8ad15c94954dff80bf0f69ce93733b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape 2021" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sexism", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1041,36 +866,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexism" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1085,13 +932,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Misuse" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Concept representing Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1102,12 +949,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", + "@id": "_:N6cac8122190f46a0a7c3faefb6d9b5e8", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1126,7 +989,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1142,13 +1005,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1159,31 +1022,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1197,31 +1054,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "has incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1240,7 +1097,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1262,7 +1119,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1273,16 +1130,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -1295,9 +1156,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1313,43 +1180,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Concept representing Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@id": "_:N8ef4624224704efca6edb5fd67d5ad16", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1363,50 +1245,54 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#SocietalBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.57,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1422,29 +1308,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1461,6 +1347,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1474,13 +1365,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1491,19 +1382,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1516,15 +1404,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1540,51 +1422,105 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "_:N4f1e8d9a5f314a419875e658936b3a20", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the use of specified control" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#UserRisks", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1599,37 +1535,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -1650,7 +1585,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N70af67194f054cbcbe4d1d616683423b" + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1666,13 +1601,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Concept representing Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1683,35 +1618,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:N70af67194f054cbcbe4d1d616683423b", + "@id": "_:N4136f4674aaf4029a47b4c05d018c89f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1726,13 +1660,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialLoss" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Concept representing violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1743,41 +1677,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nadd5922c22574bd38879939155a85ae3" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1793,64 +1707,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" - } - ] - }, - { - "@id": "_:Nadd5922c22574bd38879939155a85ae3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#InformativenessBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.24,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1866,42 +1768,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1915,37 +1823,50 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" + "@value": "Very High Risk" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1958,15 +1879,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1982,59 +1897,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "_:N8794b6b13e9d4717ba13a2af3ac76d7f", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2050,48 +1963,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Concept representing Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", + "@id": "_:N5c0b0899cae64a3686f0c26a61c79a66", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-12" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.18,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2099,56 +2023,49 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.14,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2164,48 +2081,98 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "0.11,xsd:decimal" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Risk Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AgeDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2221,36 +2188,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Discrimination based on a person's age, often impacting older or younger individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Age Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -2271,7 +2237,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908" + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2282,18 +2248,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Concept representing Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2304,12 +2273,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" + "@value": "Violating Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N9d0ffcdeb1cc40949f2448e2928b9908", + "@id": "_:Nce79a95d2f144521b21036fa85ad2e98", "@type": [ "https://schema.org/WebPage" ], @@ -2325,11 +2300,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -2339,12 +2314,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2360,58 +2330,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2427,63 +2387,81 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#GeographicDiscrimination", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's geographical origin or residence" + "@value": "Concept representing Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2494,70 +2472,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Geographic Discrimination" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasIncident", + "@id": "_:Nf6dc80dcd20441e0b96ccc85c65051a8", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Indicates an incident is associated with the specified context" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#core-properties" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "has incident" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2578,7 +2522,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd" + "@id": "_:N0bcefedd768f46769c68ec31fad757da" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2594,13 +2538,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Concept representing Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2611,28 +2555,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Coercion" } ] }, { - "@id": "_:Nbeb5275f37714193a687456b9ac9f0dd", + "@id": "_:N0bcefedd768f46769c68ec31fad757da", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightObstructed", + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2654,13 +2598,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Interference with or blocking of the exercise of rights" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2671,30 +2615,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Obstruction of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Notice" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2703,33 +2649,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk#PotentialImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -2739,17 +2684,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-29" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.5,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2760,45 +2705,77 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Potential Impact" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#GroupRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -2808,12 +2785,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2829,29 +2801,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#Bias", + "@id": "https://w3id.org/dpv/risk#DataAggregationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2890,13 +2862,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskConcept" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2907,31 +2879,27 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Bias" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#core-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2947,52 +2915,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RequirementsBias", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3008,68 +2972,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs in or during requirements creation" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Requirements Bias" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3080,74 +3023,88 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Confidentiality Incident" } ] }, { - "@id": "_:Nf5f7338abaa749279997d9d169a6f7b2", + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29" + "@language": "en", + "@value": "Incident Concluding Report" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3155,6 +3112,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3163,53 +3125,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" - } - ] - }, - { - "@id": "_:N4a6ecf056dcd484394a81241d36bbc29", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -3219,18 +3161,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Neee39564ca4e493181200a260513b3de" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3246,40 +3177,76 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "_:Neee39564ca4e493181200a260513b3de", + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ImpactControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that removes Impact i.e. prevents it from materialising" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Remove Impact" } ] }, @@ -3313,7 +3280,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N95204127ed924036926f89eb7e5b0678" + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3335,7 +3302,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Concept representing Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3351,7 +3318,7 @@ ] }, { - "@id": "_:N95204127ed924036926f89eb7e5b0678", + "@id": "_:N02e40002b0cd4a9e827861b534b4f4a3", "@type": [ "https://schema.org/WebPage" ], @@ -3367,15 +3334,21 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Harassment", + "@id": "https://w3id.org/dpv/risk#SexDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3389,7 +3362,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#Sexism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination based on a person's biological sex" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3400,35 +3379,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harassment" + "@value": "Sex Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3444,33 +3419,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Group Attribution Bias" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3483,9 +3461,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6f377135bda24668a1071c5670204b53" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3501,80 +3485,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Concept representing Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "_:N6f377135bda24668a1071c5670204b53", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Legal Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -3595,7 +3550,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1" + "@id": "_:N37a077a62e9c415d99face23df8fac51" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3606,18 +3561,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Concept representing Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3628,28 +3586,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Violating Legal Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N1901c1ed41d1450e8bf3d384179c03b1", + "@id": "_:N37a077a62e9c415d99face23df8fac51", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3668,7 +3632,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3690,7 +3654,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3701,30 +3665,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3738,55 +3703,43 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#PersonalisationDisabled", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3802,29 +3755,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Personalisation Disabled" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3843,7 +3796,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3859,13 +3812,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3876,31 +3829,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#PersonalisationEnabled", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.60,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3916,46 +3862,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Personalisation Enabled" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3964,6 +3911,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3977,13 +3929,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Concept representing Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3994,50 +3946,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Confidentiality Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "_:Nac9d0e5310624bdaa36928adfc83cd23", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Individual Risk" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4056,7 +3986,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4072,13 +4002,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4089,16 +4019,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -4108,12 +4037,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.04,xsd:decimal" + "@id": "https://w3id.org/dpv/examples#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4121,7 +4050,12 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Status" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" @@ -4129,53 +4063,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk#IncidentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.73,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4186,38 +4114,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -4238,7 +4164,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e" + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4254,13 +4180,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Concept representing Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4271,28 +4197,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "_:Ne5ee9fb5e7b64c9ebdad1f6da839152e", + "@id": "_:Nc5026195e7b14c40be58a9f1056ce556", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#RightsLimited", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4303,13 +4235,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -4331,13 +4263,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Compensation" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "A limitation or restrictions on the scope or exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4348,12 +4280,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Rights Limited" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4372,7 +4310,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4388,13 +4326,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4405,24 +4343,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DirectDiscrimination", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4438,33 +4383,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Direct Discrimination" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4477,9 +4426,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.36,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4495,52 +4450,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Concept representing Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@id": "_:N0962e4a2cb3c432cbe7bea880b6a198f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Harm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-13" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4556,13 +4527,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + "@value": "Concept representing Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4573,50 +4544,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Simpson'S Paradox Bias" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "Harm" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4635,7 +4574,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4657,7 +4596,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4668,16 +4607,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -4687,7 +4629,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4703,267 +4656,2442 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Concept representing Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "_:Nb1fd8bc593c8451185f2c006c91a4187", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "https://schema.org/name": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/url": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Delaram Golpayegani" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Harshvardhan J. Pandit" - }, + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Beatriz Esteves" - }, + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Georg P. Krog" - }, + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Julio Fernandez" - }, + "@language": "en", + "@value": "A report describing the detection of a Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Axel Polleres" - }, + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "Rob Brennan" - }, + "@language": "en", + "@value": "Incident Detection Report" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@value": "Fajar Ekaputra" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://purl.org/vocab/vann/example": [ { - "@value": "Julian Flake" - }, + "@id": "https://w3id.org/dpv/examples#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Daniel Doherty" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@value": "Control that modifies risk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "Risk Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Paul Ryan" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Rob Brennan" - }, + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "Low Risk (RM5x5 S:1 L:5)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Beatriz Esteves" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Julian Flake" + "@value": "Control to contain event" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "Containment Control" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reward", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Renumeration" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reward" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PublicServicesExclusion", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Public Services Exclusion" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Group Attribution Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.18,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:3 L:3)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InabilityToFulfillLegalObligations", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Inability to Fulfill Legal Obligations" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Matrix 5x5" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Data Access" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Data Access" + } + ] + }, + { + "@id": "_:N1b8197f4f48f4bafb36b7235c07dde26", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing an attack on security with the aim of undermining it" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Security Attack" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Floods", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The occurence or potential occurence of floods" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Floods" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CoverageBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Coverage Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalSupportLimited", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Legal Support Limited" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Risk is Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:7 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Concluded" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Suspected" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ServiceDenied", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Service Denied" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N877aeaa00e28404d96212fa2798843da" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Loss" + } + ] + }, + { + "@id": "_:N877aeaa00e28404d96212fa2798843da", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonNormalityBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Normality Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Unauthorised Resource Use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Resource Use" + } + ] + }, + { + "@id": "_:Ndf3bd897d1cc41b0b68f6d50fc143e66", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Preliminary Report" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident involving cross-border or multiple jurisdictions" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cross-Border Incident" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UserRisks", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concepts associated with risks that arise due to User or Human use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "User Risks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonResponseBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Response Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Compensation", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Renumeration" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Compensation" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Likelihood" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Renumeration", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Remuneration" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM3x3 S:1 L:3)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ImpactControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that changes Impact" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Change Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MonitorControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Monitor Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReductionControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduce Severity" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "modified" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#PolicyRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Violation of Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + } + ] + }, + { + "@id": "_:Nd2d7c8e1bd294555af4e04d1c4b23628", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Risk is Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevented", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2024-08-18" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@language": "en", + "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "risk" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Rights Exercise Prevented" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "RISK" + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DelayedApplicationProcessing", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "2.1-dev" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "Concept representing delayed processing of applications" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Delayed Application Processing" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv#Incident" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv#Risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@id": "_:N889cd521927340be8913f31c0baa2b9b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4977,36 +7105,50 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Concept representing Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "Copyright Violation" } + ] + }, + { + "@id": "_:N889cd521927340be8913f31c0baa2b9b", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv#Incident" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5025,7 +7167,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5047,7 +7189,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5058,31 +7200,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.25,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5098,64 +7244,99 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" + "@value": "Rule-Based System Design" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalBias", + "@id": "https://w3id.org/dpv/risk#ServiceTermination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Stub" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Service Termination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskSource", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5163,6 +7344,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5171,48 +7357,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Bias" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk#GeographicDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5228,52 +7407,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Discrimination based on a person's geographical origin or residence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Geographic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-03-23" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5289,13 +7468,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#Compensation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + "@value": "Concept representing benefits - both material and immaterial" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5306,31 +7485,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rule-Based System Design" + "@value": "Benefit" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + "@value": "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal" } ] }, { - "@id": "https://w3id.org/dpv/risk#PotentialRisk", + "@id": "https://w3id.org/dpv/risk#isExploitedBy", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5338,52 +7522,46 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential Risk" + "@value": "is exploited by" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/domainIncludes": [ { - "@language": "en", - "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#SourceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -5393,12 +7571,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.51,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5414,36 +7587,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#RequirementsBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5458,13 +7648,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5475,35 +7665,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Requirements Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk#InformativenessBias", + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5519,85 +7706,77 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Informativeness Bias" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialLoss" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5610,15 +7789,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nedb073eb260845019e04df25c90d654e" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5634,49 +7807,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Security Breach" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } - ] - }, - { - "@id": "_:Nedb073eb260845019e04df25c90d654e", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -5686,7 +7843,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5702,52 +7859,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#StatisticalBias", + "@id": "https://w3id.org/dpv/risk#ServiceQualityReduced", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO 20501:2019" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5763,13 +7909,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5780,16 +7926,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Statistical Bias" + "@value": "Service Quality Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -5799,7 +7945,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5815,51 +7961,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5875,47 +8018,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#IdentificationControl", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#ThreatSource" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5929,45 +8063,43 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#ServiceNotProvided", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5983,33 +8115,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Service Not Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -6019,12 +8151,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6040,29 +8172,66 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6070,7 +8239,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6091,7 +8260,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932" + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6107,13 +8276,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Concept representing Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6124,12 +8293,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Blackmail" } ] }, { - "@id": "_:N24492f14343b4b90bddc2673a3b6d932", + "@id": "_:Nc1a4fdfe3d6e42c892f10b82d26f3fe6", "@type": [ "https://schema.org/WebPage" ], @@ -6145,15 +8314,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#MonitorImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -6163,18 +8328,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6190,60 +8344,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" - } - ] - }, - { - "@id": "_:Nf6476b21fba346e9bf8b73e31985a82d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6259,33 +8401,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to recover from event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Recovery Control" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk#MonitorControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -6295,12 +8437,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6316,38 +8453,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -6362,42 +8511,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6411,34 +8566,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6448,17 +8604,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.60,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6469,38 +8625,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -6513,6 +8663,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6521,33 +8676,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -6560,9 +8717,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N415855303c6a4ae18e62e54d5a894a07" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6573,38 +8736,63 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" + }, + { + "@id": "https://w3id.org/dpv/risk#ViolatingObligation" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Concept representing Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Violating Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "_:N415855303c6a4ae18e62e54d5a894a07", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -6614,12 +8802,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6635,52 +8823,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#InGroupBias", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAssessment" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@id": "_:N47d4f59132ee43c7a1a7cdfb728f2362" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6696,33 +8889,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "In-Group Bias" + "@value": "Risk Matrix" + } + ] + }, + { + "@id": "_:N47d4f59132ee43c7a1a7cdfb728f2362", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -6732,17 +8940,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.64,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6753,67 +8961,70 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv#ImpactAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "Risk Concepts - HTML serialiation" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@id": "https://w3id.org/dpv/risk/risk.html" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6826,15 +9037,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6850,49 +9055,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" - } - ] - }, - { - "@id": "_:N8b9f2d1d632c45faa56adaecdd13b880", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -6902,12 +9091,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.43,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6923,35 +9107,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ConfirmationBias", + "@id": "https://w3id.org/dpv/risk#DataProcessingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6990,13 +9168,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7007,23 +9185,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confirmation Bias" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk#HighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -7032,10 +9207,9 @@ "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7051,39 +9225,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Actions or measures that prevent an individual or group from exercising their legal rights." + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" + "@value": "High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7093,12 +9273,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7114,38 +9294,112 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Scam", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Scam" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination", + "@id": "_:Nbd47763f2edc4e66b89eca3c2f85c73b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IndirectDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7179,7 +9433,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" + "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7190,31 +9444,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "SexualOrientation Discrimination" + "@value": "Indirect Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#IntegrityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.67,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7222,6 +9470,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7230,56 +9483,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Integrity Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7290,18 +9535,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7312,38 +9557,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "Organisational Risk Concept" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N2e3f3bb408684e94bd5adf755fb28fcf", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Organisational in this context refers to an organisation which is not human but is managed by humans" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -7353,7 +9581,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7361,6 +9589,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7369,37 +9602,44 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Confidentiality Concept" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -7420,7 +9660,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0" + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7436,13 +9676,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Concept representing Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7453,37 +9693,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:N33e80877b3bc478ab0a8989f9ae643c0", + "@id": "_:N1f1feef65d2a4c668b590bb6227c0d15", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -7504,7 +9742,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3" + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7520,13 +9758,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7537,36 +9775,49 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Human Errors" } ] }, { - "@id": "_:N6da64df7f15c4e3a94aaf74e89c8f9f3", + "@id": "_:Nf127cf57cf15498ca6ef8ee508517c74", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@id": "https://w3id.org/dpv/risk#core-properties", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7581,17 +9832,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv#RiskLevel" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7610,7 +9873,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7626,13 +9889,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7643,20 +9906,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk#RacialDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7664,9 +9931,81 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Racism" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Discrimination against individuals because of their racial background or skin color" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Racial Discrimination" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0071" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7677,29 +10016,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Concept representing Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Data Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", + "@id": "_:Nd2791762528a4cecb4f6c3d8dd4e667b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7718,7 +10073,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7740,7 +10095,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7751,31 +10106,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk#CognitiveBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.12,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7791,33 +10150,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Bias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -7830,9 +10192,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7848,42 +10216,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Concept representing Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Lose of Reputation" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept", + "@id": "_:Nd431b452ffcc46fb93173aa4f7847c80", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7891,52 +10280,46 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Concept" + "@value": "has threat source" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/domainIncludes": [ { - "@language": "en", - "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7946,7 +10329,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7962,49 +10350,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8019,33 +10395,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Concept representing Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Component Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -8055,12 +10437,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3a914addd1624a6ab69826c81a0b0778" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8076,99 +10453,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:N3a914addd1624a6ab69826c81a0b0778", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/guides", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Vulnerability" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8181,15 +10523,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8205,49 +10541,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Nd268380dc1f84dea9ec58ef31331c264", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8257,7 +10577,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8273,33 +10598,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8309,12 +10634,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8330,45 +10650,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", + "@id": "https://w3id.org/dpv/risk#MaliciousActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8383,13 +10694,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8400,12 +10711,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Malicious Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8424,7 +10735,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8440,13 +10751,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8457,16 +10768,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvoidSource", + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8476,7 +10791,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8492,32 +10818,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Concept representing Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", + "@id": "_:N6bfbc4749a104df0988cc2f6c84d8a6a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8527,17 +10875,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "_:N985d9d3940a5494c898615fbbabe81ef" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8548,71 +10902,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Concept representing Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "_:N985d9d3940a5494c898615fbbabe81ef", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Societal Health & Safety" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8625,9 +10961,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.41,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Neca6b5963bf24a948454cd84f743913d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8643,37 +10985,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Concept representing Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@language": "en", + "@value": "Compromise Account Credentials" + } + ] + }, + { + "@id": "_:Neca6b5963bf24a948454cd84f743913d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", + "@id": "https://w3id.org/dpv/risk#Sexism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8681,11 +11043,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8694,33 +11051,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Notice" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "Sexism" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8730,12 +11087,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8751,58 +11108,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SelectionBias", + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8818,13 +11158,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + "@value": "Discrimination based on a person's sexual orientation, typically against those who are not heterosexual" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8835,16 +11175,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Selection Bias" + "@value": "SexualOrientation Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -8854,12 +11197,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.57,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8875,48 +11219,79 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Concept representing Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/title": [ { - "@value": "0.16,xsd:decimal" + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8930,39 +11305,45 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8970,11 +11351,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -8983,37 +11359,40 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk#RightsViolated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -9022,9 +11401,10 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9040,54 +11420,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" + "@value": "Rights Violated" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk#ServiceSecurityReduced", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9103,59 +11476,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Service Security Reduced" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#ExcellenceDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9171,13 +11526,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9188,47 +11543,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:N05a9ed7355894f6bb37c02c33f9226da", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Excellence Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#SamplingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.31,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9244,32 +11587,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept", + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9279,17 +11628,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9300,50 +11655,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept is relevant to 'Integrity' in CIA InfoSec model" + "@value": "Concept representing Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Concept" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "_:N251ba1b094c1445681b89f5ed2bc9af8", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PolicyRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9358,47 +11714,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Risks and consequences regarding policy and its associated processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Policy Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-03-23" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9409,41 +11775,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Concept representing Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReligiousDiscrimination", + "@id": "https://w3id.org/dpv/risk#hasVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9457,35 +11824,38 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Discrimination" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's religious beliefs or practices" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Religious Discrimination" + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -9495,12 +11865,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.9,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9516,56 +11887,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Concept representing Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.02,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9576,43 +11950,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#GenderDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9628,29 +12000,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Discrimination based on a person's gender identity or gender expression" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Gender Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9669,7 +12041,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9685,13 +12057,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9702,16 +12074,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -9721,12 +12096,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.40,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9742,52 +12118,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Concept representing Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#PotentialImpact", + "@id": "https://w3id.org/dpv/risk#DataBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9798,54 +12179,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Bias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'impact' concept within an use-case" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential Impact" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#IndividualRisk", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9858,45 +12221,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -9906,18 +12259,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N366da704654a4b4682d8de807d0f1bef" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9933,49 +12275,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:N366da704654a4b4682d8de807d0f1bef", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk#PotentialConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -9985,17 +12310,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-29" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.1,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10006,52 +12331,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" + "@value": "Potential Consequence" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#Racism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10067,29 +12387,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Prejudice or discrimination against people based on their race" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Racism" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10108,7 +12428,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10124,13 +12444,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10141,18 +12461,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10173,7 +12494,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf" + "@id": "_:N7acfc235cc254becbaba265d4ea9494e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10184,18 +12505,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Concept representing Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10206,29 +12527,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Cryptojacking" } ] }, { - "@id": "_:N5850f0c566fc46f99db4e5567d64ffdf", + "@id": "_:N7acfc235cc254becbaba265d4ea9494e", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" } ] }, @@ -10290,31 +12605,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#CognitiveBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -10329,13 +12627,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Bias" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when humans are processing and interpreting information" + "@value": "Concept representing accidental misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10346,24 +12644,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cognitive Bias" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#AgeDiscrimination", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10379,29 +12679,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's age, often impacting older or younger individuals" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Age Discrimination" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10418,6 +12718,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10431,13 +12736,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10448,20 +12756,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Very Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -10482,7 +12795,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N636eafbaa808469aa226aaa74ca74855" + "@id": "_:Nae5245156caa4c27aeb793246d56954e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10493,18 +12806,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#GroupRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Concept representing Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10515,18 +12828,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Terrorism" } ] }, { - "@id": "_:N636eafbaa808469aa226aaa74ca74855", + "@id": "_:Nae5245156caa4c27aeb793246d56954e", "@type": [ "https://schema.org/WebPage" ], @@ -10542,11 +12849,15 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -10556,7 +12867,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10572,41 +12894,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Concept representing Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misogyny", + "@id": "_:Ncea935dc14634ed1b18a2679a5824fa9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10614,6 +12948,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10622,29 +12961,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against women" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misogyny" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10663,7 +13002,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10679,13 +13018,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10696,41 +13035,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#ServicePartiallyProvided", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10746,13 +13068,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10763,56 +13085,29 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:Nb81ef67053e949d7a297791513c8eab8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "Service Partially Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact", - "https://w3id.org/dpv/risk#RiskConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -10821,6 +13116,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N597e8421bc334907aef6fa116a95a520" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10834,20 +13134,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - }, - { - "@id": "https://w3id.org/dpv/risk#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" - }, - { - "@language": "en", - "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" + "@value": "Concept representing Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10858,36 +13151,45 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", + "@id": "_:N597e8421bc334907aef6fa116a95a520", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/source": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ServiceAlternativeOffered", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10898,33 +13200,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Service Alternative Offered" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -10934,12 +13238,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na801ef084cf6488facf5802801e4ce8b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10955,61 +13265,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Concept representing Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" + "@value": "Illegal Data Processing" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@id": "_:Na801ef084cf6488facf5802801e4ce8b", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk#ServiceProvided", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11025,39 +13337,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Service Provided" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11070,23 +13376,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11102,45 +13394,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N0426ec6d5cf347c5a7bd7d65a41a40c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11159,7 +13435,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11175,13 +13451,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11192,12 +13468,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11216,7 +13492,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11232,13 +13508,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11249,30 +13525,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11286,48 +13563,50 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LanguageDiscrimination", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11343,64 +13622,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Language Discrimination" - } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/examples" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11410,7 +13658,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11426,39 +13679,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DetectionControl", + "@id": "https://w3id.org/dpv/risk#RightsEroded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11473,33 +13723,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "The gradual weakening or reduction of the scope and protection of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Rights Eroded" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -11525,13 +13781,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11542,12 +13798,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11555,8 +13811,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -11577,7 +13832,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1" + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11588,7 +13843,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -11599,7 +13854,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Concept representing Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11610,46 +13865,63 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:Nd6abb4f630e44551bf502809758f49c1", + "@id": "_:N15b423b5aab14fbbaf670bb85686b4ce", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk#Reidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11660,37 +13932,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Concept representing Re-identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11703,15 +13977,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11727,54 +13995,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:N8a73cba67e0045688727d0972f8b70f6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#ErroneousUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -11795,7 +14045,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00" + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11811,13 +14061,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Concept representing erroneous use (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11828,12 +14078,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Erroneous Use" } ] }, { - "@id": "_:Ne12951e4dd044f82839888833ef1ed00", + "@id": "_:N10e5dc2af72a4b21bdabbd8f631e7da6", "@type": [ "https://schema.org/WebPage" ], @@ -11849,32 +14099,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk#DisabilityDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11890,35 +14127,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Discrimination against individuals based on physical or mental disabilities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Disability Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -11939,7 +14177,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01" + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11955,13 +14193,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Concept representing Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11972,12 +14210,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "Injury" } ] }, { - "@id": "_:Nb25080bff4db4360b4a34f732e5f2b01", + "@id": "_:N8651b47063664d20b2ba264b48a3f9fb", "@type": [ "https://schema.org/WebPage" ], @@ -11993,7 +14231,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#DisproportionateEnergyConsumption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12002,26 +14240,10 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12037,13 +14259,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12054,32 +14276,19 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:Nf7743fc84c5c4416a82dd9015d574be4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Disproportionate Energy Consumption" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -12092,9 +14301,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.43,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12110,48 +14325,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Concept representing Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Lose of Credibility" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "_:N285908a894ec4c26b9d7ba10b30d9c09", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.01,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12167,55 +14402,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12230,53 +14446,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Level where Severity is Low" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Individual Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk#Transphobia", + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12292,35 +14492,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Transphobia" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -12330,126 +14527,92 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-29" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Indicates a concept is relevant to 'Availability' in CIA InfoSec model" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" + "@value": "Availability Concept" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact" } ] }, { - "@id": "_:N01592d7a5ed64907a324ef43ea425e66", + "@id": "https://w3id.org/dpv/risk#incident-classes", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "accepted" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Physical Harm" + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12464,13 +14627,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Concept representing Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12481,35 +14644,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataAggregationBias", + "@id": "_:N6f8acb8c86864ca8ad3ac6a91b042477", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12525,49 +14700,78 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Aggregation Bias" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#IntegrityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "0.29,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RightsObstructed", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12582,33 +14786,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Interference with or blocking of the exercise of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Rights Obstructed" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -12618,12 +14828,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12639,43 +14844,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "https://w3id.org/dpv/risk#Misogyny", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12691,43 +14894,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Dislike, contempt, or prejudice against women" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Misogyny" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk#RecoveryControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12743,42 +14941,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsDenial", + "@id": "https://w3id.org/dpv/risk#PotentialRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-29" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -12787,47 +14997,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The refusal or withholding or denial of the existence or applicability of rights" + "@value": "Indicates a concept can potentially be a 'risk' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Rights" + "@value": "Potential Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#CasteDiscrimination", + "@id": "https://w3id.org/dpv/risk#LowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12843,48 +15060,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Caste Discrimination" + "@value": "Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk#ViolatingProhibition", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12900,49 +15121,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Violating Prohibition" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.49,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12957,29 +15168,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Concept representing Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#SexualHarassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12988,23 +15199,6 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -13018,13 +15212,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Renumeration" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13035,12 +15223,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Sexual Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13051,13 +15239,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -13079,13 +15267,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Renumeration" + "@id": "https://w3id.org/dpv/risk#GroupRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Concept representing Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13096,30 +15284,41 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-19" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13130,36 +15329,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Concept representing Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -13169,18 +15371,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13196,51 +15392,46 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" - } - ] - }, - { - "@id": "_:Nb4a93ceb76a94f86bf2aecc2c7c3626e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Very Low Likelihood" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13261,7 +15452,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N8626c0b412094a41834e4fa199b449f9" + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13277,13 +15468,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Concept representing System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13294,63 +15485,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" + "@value": "System Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N8626c0b412094a41834e4fa199b449f9", + "@id": "_:Ne35e93a51e9c46a5b77815855f68a6c0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#ImplicitBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13366,13 +15551,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13383,46 +15568,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Implicit Bias" } ] }, { - "@id": "_:Na6abd65d0ac04daebf2b0ed3e28e774b", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.67,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13433,34 +15608,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource" + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13475,13 +15669,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Renumeration" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13492,25 +15686,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13518,11 +15718,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -13531,35 +15726,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.43,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13574,49 +15783,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.37,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -13631,38 +15827,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialLoss" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13675,15 +15866,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13699,62 +15884,46 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" - } - ] - }, - { - "@id": "_:N174281b4f06940a18a9e6519d98fa3e3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -13776,13 +15945,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Concept representing a misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13793,30 +15962,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.99,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13827,37 +16002,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -13878,7 +16051,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N45e627abb33f484ea319253eb043bcd9" + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13894,13 +16067,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#LegalComplianceRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Concept representing Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13911,28 +16084,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Public Order Breach" } ] }, { - "@id": "_:N45e627abb33f484ea319253eb043bcd9", + "@id": "_:Ndb0d2e5a40154b18b4fb6524c38f8299", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13940,7 +16113,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13961,7 +16134,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac" + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13972,18 +16145,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Concept representing Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13994,46 +16167,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:Nc6da3c6146eb4f579d2f47ad798793ac", + "@id": "_:Nd2d76f990dd5415fbafba6036876d8f4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#NationalityDiscrimination", + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14041,65 +16204,9 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Discrimination" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Discrimination based on a person's nationality or citizenship" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Nationality Discrimination" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14110,29 +16217,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Out-Group Homogeneity Bias" + "@value": "Accidental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexDiscrimination", + "@id": "https://w3id.org/dpv/risk#Homophobia", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14160,13 +16267,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's biological sex" + "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14177,16 +16284,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sex Discrimination" + "@value": "Homophobia" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14199,9 +16310,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1abbefd32bc845a7880d7b75d2794630" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14217,48 +16334,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Concept representing Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "_:N1abbefd32bc845a7880d7b75d2794630", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SelectionBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14274,33 +16411,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -14310,7 +16447,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14326,36 +16463,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14376,7 +16515,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584" + "@id": "_:N98503b14c8cf4817af92c366e96c81e7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14392,13 +16531,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Concept representing Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14409,51 +16548,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:Nfd0de96f2c954f98a37e68d479cf2584", + "@id": "_:N98503b14c8cf4817af92c366e96c81e7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImplicitBias", + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14469,43 +16597,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#CognitiveBias" + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + "@value": "A consequence related to the provision of a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Implicit Bias" - } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ne104ff760db74660882033533a21b5f9" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -14514,23 +16652,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "_:Ne104ff760db74660882033533a21b5f9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14543,15 +16707,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14562,75 +16720,96 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "_:N0a34fe80365b48f094c7f188d8fc4eda", + "@id": "https://w3id.org/dpv/risk#FinancialImpact", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#OrganisationalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk#InabilityToProcessPayments", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14646,29 +16825,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Inability to Process Payments" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14697,7 +16876,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae" + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14713,13 +16892,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Concept representing Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14730,28 +16909,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Fraud" } ] }, { - "@id": "_:N72f880006766453c8c5284ca9a8c23ae", + "@id": "_:Nc8a11eef869f4d12aca32f346960f5ce", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14770,7 +16949,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14792,7 +16971,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14803,20 +16982,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -14826,18 +17001,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14853,73 +17017,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:Nb72c07b7fa024bcf85183796d36738b4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#ReverseDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14935,13 +17067,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14952,32 +17084,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" - } - ] - }, - { - "@id": "_:N901a14c9bd0e4f5c896a16b8e2500e0c", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Reverse Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14987,7 +17103,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15003,57 +17124,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#DirectDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15069,13 +17174,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15086,48 +17191,35 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" - } - ] - }, - { - "@id": "_:N625f03306b04496198a17a1c1fc9f2cc", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Direct Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk#ConfirmationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15143,37 +17235,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15181,11 +17279,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15194,32 +17287,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#PotentialRiskSource", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -15229,17 +17323,17 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.64,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15250,39 +17344,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential RiskSource" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -15292,7 +17383,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15306,35 +17408,57 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@language": "en", + "@value": "Rights Impact" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } + ] + }, + { + "@id": "_:N55bb1b7164904cc6a8094efd7a3a54e8", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Halt Source" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -15344,12 +17468,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15365,29 +17489,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -15405,7 +17535,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15416,13 +17546,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15433,16 +17563,20 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15455,9 +17589,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndede7eca20f8479483447fce78fdad36" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15473,48 +17613,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Concept representing Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "_:Ndede7eca20f8479483447fce78fdad36", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.99,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15522,6 +17667,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15530,29 +17680,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Deliberate Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity", + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15574,13 +17724,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#Misuse" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others" + "@value": "Concept represent an intentional misuse (of something)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15591,41 +17741,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Activity" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#InabilityToProvideHealthCare", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15641,13 +17774,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15658,32 +17791,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N6c6d538ee9bb4882b82706546ddb75a1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Inability to Provide Health Care" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -15693,12 +17810,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15714,37 +17831,44 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#IncidentRegister", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -15754,18 +17878,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9d18ac853d6249008536496d60a088cd" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15773,104 +17886,55 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:N9d18ac853d6249008536496d60a088cd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#core-properties", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.w3.org/TR/html/" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@language": "en", + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#Misandry", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15885,13 +17949,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#Sexism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Dislike, contempt, or prejudice against men" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15902,28 +17966,17 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Misandry" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorControl", + "@id": "https://w3id.org/dpv/risk#ReductionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -15949,7 +18002,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15960,31 +18013,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15998,41 +18051,38 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/contributor": [ { @@ -16053,7 +18103,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee" + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16069,13 +18119,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Concept representing Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16086,31 +18136,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "_:N4b1162ed9d0943b682f95eb0cf23a0ee", + "@id": "_:N1cfcf26e557b4bb9a3bafa525ef7a3fd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ThreatSource", + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" + } ], "http://purl.org/dc/terms/created": [ { @@ -16118,14 +18184,14 @@ "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/examples#E0069" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16137,103 +18203,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ImpactControl" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that changes Impact" + "@value": "refers to risk" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv#Incident" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "Change Impact" + "@id": "https://w3id.org/dpv#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N58c7a823728a4bbc929c09b50030b836" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16241,53 +18245,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Identifier associated with an incident" } - ] - }, - { - "@id": "_:N58c7a823728a4bbc929c09b50030b836", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16306,7 +18294,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16328,7 +18316,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16339,30 +18327,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -16371,6 +18360,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -16384,13 +18378,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Concept representing System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16401,31 +18395,51 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "System Intrusion" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@id": "_:Na32a3960ceab4c378b886b3b5a4df4a3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InGroupBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.20,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16441,43 +18455,40 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@id": "https://w3id.org/dpv/risk#ViolatingObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16493,52 +18504,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Violating Obligation" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16554,33 +18561,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Renumeration" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16593,9 +18605,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16611,53 +18629,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Concept representing Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "_:N10ee2240e7bf499791a93ab92c1d52ba", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16672,13 +18688,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16689,30 +18705,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#EthnicDiscrimination", + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16728,48 +18740,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Racism" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Ethnic Discrimination" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#ServiceCostIncreased", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16785,33 +18790,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Service Cost Increased" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16821,12 +18830,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16842,60 +18857,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Concept representing Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" + "@value": "Authorisation Failure" + } + ] + }, + { + "@id": "_:Nd04671af3b3e43f3923ba1afdbf1c2e1", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISa Trust Services Security Incidents 2021" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk#ReligiousDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.06,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16911,44 +18923,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Discrimination based on a person's religious beliefs or practices" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Religious Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "https://w3id.org/dpv/risk#LegallyRelevantConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16963,36 +18967,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#LegalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "A consequence that is legally relevant i.e. actionable under law" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Legally Relevant Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -17002,18 +19003,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17029,65 +19019,36 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" - } - ] - }, - { - "@id": "_:Na8f6576a12fe4aa790a7bb49cbe30f57", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#RightsUnfulfilled", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17102,50 +19063,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Failure to meet or complete the fulfilment of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" + "@value": "Rights Unfulfilled" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17158,15 +19108,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17182,68 +19126,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SecurityAttack" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:Nc32ca360a68540de9b7d635beec8d66a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataProcessingBias", + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17259,53 +19178,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBias" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Processing Bias" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.75,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17316,60 +19229,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Severity" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowLikelihood", + "@id": "https://w3id.org/dpv/risk#InabilityToEstablishLegalClaims", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17385,54 +19279,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Inability to Establish Legal Claims" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentReport" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17441,29 +19330,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17492,7 +19381,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03" + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17514,7 +19403,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Concept representing Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17525,7 +19414,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" + "@value": "Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -17536,7 +19425,7 @@ ] }, { - "@id": "_:Ncf6914c4c714452a9e55c4b74600bb03", + "@id": "_:N3201fc5bc11741b59b8c9812d514b0f9", "@type": [ "https://schema.org/WebPage" ], @@ -17552,11 +19441,14 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -17566,7 +19458,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17582,41 +19485,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Concept representing Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndirectDiscrimination", + "@id": "_:N42a539bcdbd74aeea8c05294b52de08f", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17632,33 +19558,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Indirect Discrimination" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -17668,12 +19594,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17689,43 +19610,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk#CasteDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17733,11 +19652,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17746,36 +19660,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Discrimination based on a person's caste, a form of social stratification found in some cultures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Caste Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17790,57 +19717,59 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Misuse" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#hasRiskSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17854,47 +19783,36 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Harm" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" + "@value": "has risk source" } - ] - }, - { - "@id": "_:Nfd6188b04b7e46eb9887f1b58d15d3a3", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk#LowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17913,7 +19831,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17933,12 +19851,15 @@ }, { "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17949,32 +19870,41 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Low Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17990,29 +19920,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18031,7 +19961,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18053,7 +19983,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18064,36 +19994,24 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#InabilityToEnterIntoContract", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18109,13 +20027,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18126,49 +20044,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Inability to Enter Into Contract" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18176,14 +20076,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18192,56 +20084,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" - }, - { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.16,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18252,48 +20141,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.22,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18309,36 +20202,34 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsUnfulfilled", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialRiskSource" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18353,13 +20244,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Failure to meet or complete the fulfilment of rights" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18370,48 +20261,25 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unfulfilment of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Harassment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f" - } + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18426,13 +20294,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@id": "https://w3id.org/dpv/risk#Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18443,34 +20305,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" - } - ] - }, - { - "@id": "_:N1d59b89c36504d8f8bcdd128b65e935f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harassment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -18480,18 +20324,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18502,66 +20340,47 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ViolatingObligation" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" + "@value": "Very High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N89b131730fc24ef0bdd4b96fb576c2a0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -18571,18 +20390,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N01f7495831e241abad48b454e2462d19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18598,54 +20406,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" + "@value": "Incident Mitigated" } ] }, { - "@id": "_:N01f7495831e241abad48b454e2462d19", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RemedyControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18661,29 +20463,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18702,7 +20504,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.61,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18718,13 +20520,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18735,49 +20537,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18785,7 +20550,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -18806,7 +20571,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d" + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18817,7 +20582,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -18828,7 +20593,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Concept representing Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18839,92 +20604,53 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" + "@value": "Data Corruption" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "_:Nd227c62ffdf2457b9e8cd3423f772a8d", + "@id": "_:Nb2284294327849bb8d9ce6140e2ce2c1", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/contributor": [ { - "@language": "en", - "@value": "Environmental Risk" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskManagement", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18932,37 +20658,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#RightsDenied", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18971,28 +20697,6 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -19006,13 +20710,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RightsImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "The refusal or withholding or denial of the existence or applicability of rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19023,32 +20727,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" - } - ] - }, - { - "@id": "_:Nbd4d2dfe6f2946258dcb9c3c98d15984", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Rights Denied" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19058,12 +20752,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19079,58 +20773,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -19139,6 +20823,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndfdabe58832a445293583eabfe4518fb" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -19152,13 +20841,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The infringement or breach of rights in a manner that constitues a 'violation' of those rights" + "@value": "Concept representing Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19169,30 +20858,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" + "@value": "Unwanted Code Deletion" } + ] + }, + { + "@id": "_:Ndfdabe58832a445293583eabfe4518fb", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#Homophobia", + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19200,6 +20895,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19208,41 +20908,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SexualOrientationDiscrimination" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Hostility or prejudice against individuals who are or are perceived to be homosexual" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Homophobia" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#GenderDiscrimination", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19258,41 +20965,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination based on a person's gender identity or gender expression" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Gender Discrimination" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExcellenceDiscrimination", + "@id": "https://w3id.org/dpv/risk#IncidentTerminated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19308,41 +21017,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Favoritism towards individuals deemed more competent or superior, often at the expense of others" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Excellence Discrimination" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk#DisabilityDiscrimination", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19356,49 +21071,60 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Discrimination" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against individuals based on physical or mental disabilities" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Disability Discrimination" + "@value": "exploits vulnerability" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.32,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19409,32 +21135,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -19444,12 +21171,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19457,11 +21179,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19470,49 +21187,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:Nc590feb0524c493b8dacb44803d3ae8f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -19522,7 +21223,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19538,41 +21244,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misandry", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv#Likelihood" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19588,29 +21296,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Sexism" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Dislike, contempt, or prejudice against men" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misandry" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19629,7 +21337,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19645,13 +21353,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19662,19 +21370,44 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualHarassment", + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N76a6ce1a060d4760be82a172d993465b" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -19689,7 +21422,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Concept representing a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19700,19 +21439,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Harassment" + "@value": "Compromise Account" + } + ] + }, + { + "@id": "_:N76a6ce1a060d4760be82a172d993465b", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightEroded", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.32,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -19727,49 +21495,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The gradual weakening or reduction of the scope and protection of rights" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erosion of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#ServiceProvisionDelayed", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19785,48 +21545,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Service Provision Delayed" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk#LanguageDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19842,36 +21595,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Discrimination based on a person's language, often linked to national origin or ethnicity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Language Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#ConfidentialityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19892,7 +21646,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da" + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19908,13 +21662,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Concept representing Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -19925,34 +21679,66 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" + "@value": "Unwanted Disclosure of Data" + } + ] + }, + { + "@id": "_:Ncc56824867fa4fd586431f52638e9cb9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Privacy", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } - ] - }, - { - "@id": "_:Ne49f182fb5bb4ed2ad9bd935bea746da", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -19971,7 +21757,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19987,13 +21773,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20004,36 +21790,30 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.29,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20044,36 +21824,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20083,7 +21865,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -20092,6 +21874,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -20105,13 +21892,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#MaliciousActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Concept representing Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20122,31 +21909,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Sabotage" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "_:Nb55caddaae9b4499874f7098baa7b0c9", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.1,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20154,6 +21946,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -20162,51 +21959,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Incident where the integrity of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Integrity Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#PotentialConsequence", + "@id": "https://w3id.org/dpv/risk#InabilityToProtectVitalInterests", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-29" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20214,11 +22001,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -20227,43 +22009,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates a concept can potentially be a 'consequence concept within an use-case" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Potential Consequence" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" + "@value": "Inability to Protect Vital Interests" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -20273,18 +22045,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20300,53 +22061,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" + "@value": "Monitor Consequence" } ] }, { - "@id": "_:N3c6aede3fb6c49069c2b89320b2d7f26", + "@id": "https://w3id.org/dpv/risk#IncidentHalted", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentMitigationMeasure", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20354,11 +22105,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -20367,229 +22113,267 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Daniel Doherty" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "2022-08-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, { "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@value": "Georg P. Krog" + }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "@language": "en", + "@value": "Paul Ryan" + }, { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "@value": "Rob Brennan" + }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "@language": "en", + "@value": "Delaram Golpayegani" + }, { "@language": "en", - "@value": "Remove Consequence" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ + "@value": "Beatriz Esteves" + }, { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "Julian Flake" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "https://w3id.org/dpv/risk" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2022-08-14" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "2024-08-18" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/publisher": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Availability Incident" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#IntegrityConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/title": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "Risk Concepts" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/ontology/bibo/doi": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "10.5281/zenodo.12505841" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/ontology/bibo/status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "http://purl.org/ontology/bibo/status/published" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd" + "@value": "risk" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { "@language": "en", - "@value": "accepted" + "@value": "RISK" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" + "@id": "https://w3id.org/dpv/2.1-dev/risk" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "2.1-dev" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@language": "en", - "@value": "Unauthorised System Modification" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" } - ] - }, - { - "@id": "_:N7f35769ac7ff43529bbbbb6397aecddd", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://xmlns.com/foaf/0.1/logo": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv/media/logo.png" } ], - "https://schema.org/url": [ + "https://schema.org/version": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#Bias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20605,36 +22389,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#TechnicalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20655,7 +22440,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N60882207c25442eab9509dc96896d91a" + "@id": "_:Naca18964036346eea3a9e385d3a0bc12" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20671,13 +22456,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Concept representing System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20688,12 +22473,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N60882207c25442eab9509dc96896d91a", + "@id": "_:Naca18964036346eea3a9e385d3a0bc12", "@type": [ "https://schema.org/WebPage" ], @@ -20709,15 +22500,20 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#LoyaltyProgramExclusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#AvailabilityConcept" + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -20732,13 +22528,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20749,18 +22545,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Loyalty Program Exclusion" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -20769,6 +22559,28 @@ "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -20782,13 +22594,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialLoss" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Concept representing Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -20799,16 +22611,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", + "@id": "_:N3ecaa222e7264dd2a096df5dc1ddcece", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -20818,7 +22646,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -20834,63 +22667,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" - } - ] - }, - { - "@id": "https://w3id.org/dpv/primer", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/primer" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -20900,22 +22707,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "_:N4f06055416a84591bbecd622054f617d" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -20926,49 +22734,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#SecurityAttack" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "_:N4f06055416a84591bbecd622054f617d", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "https://schema.org/url": [ { - "@value": "0.86,xsd:decimal" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -20983,57 +22795,78 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Concept representing Component Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Earthquake", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:N6177ab61947545c3b0f993f924c70c28" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21049,13 +22882,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Harm" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "The occurence or potential occurence of earthquakes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21066,84 +22899,121 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Earthquake" } ] }, { - "@id": "_:N6177ab61947545c3b0f993f924c70c28", + "@id": "https://w3id.org/dpv/risk#Incident", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples#E0070" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@language": "en", + "@value": "An actual or occured event" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "Risk Concepts - RDF/XML serialiation" + "@id": "https://w3id.org/dpv/risk#core-classes" + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/risk.rdf" + "@language": "en", + "@value": "Incident" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk#StatisticalBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.60,xsd:decimal" + "@language": "en", + "@value": "ISO 20501:2019" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21159,29 +23029,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Statistical Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -21189,7 +23059,9 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept" + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21210,7 +23082,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e" + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21226,13 +23098,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Concept representing Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21243,12 +23115,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Security Breach" } ] }, { - "@id": "_:N4cecb70bedcf46ce9f21038688293a9e", + "@id": "_:Nf88d8c3380da4b4e86746930da63d2d4", "@type": [ "https://schema.org/WebPage" ], @@ -21264,57 +23136,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RacialDiscrimination", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Racism" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Discrimination against individuals because of their racial background or skin color" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Racial Discrimination" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -21342,7 +23164,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b" + "@id": "_:Na6fecbc205414992aba88eb2c49114fb" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21364,7 +23186,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Concept representing Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21375,51 +23197,40 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "Sexual Violence" } ] }, { - "@id": "_:N91553afacd2e4fc881b533ca4457b82b", + "@id": "_:Na6fecbc205414992aba88eb2c49114fb", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", + "@id": "https://w3id.org/dpv/risk#NationalityDiscrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21435,13 +23246,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#StatisticalBias" + "@id": "https://w3id.org/dpv/risk#Discrimination" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + "@value": "Discrimination based on a person's nationality or citizenship" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21452,31 +23263,26 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confounding Variables Bias" + "@value": "Nationality Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.08,xsd:decimal" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21484,6 +23290,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskManagement" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -21492,53 +23303,77 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskSource", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Examples for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#EthnicDiscrimination", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-30" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -21549,47 +23384,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#Racism" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Discrimination against individuals based on their ethnicity or cultural heritage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Ethnic Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#ServiceLimited", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21603,60 +23432,50 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Stub" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Service Limited" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SamplingBias", + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21672,33 +23491,51 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SelectionBias" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data records are not collected randomly from the intended population" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sampling Bias" + "@value": "Moderate Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#ConfidentialityConcept", + "https://w3id.org/dpv/risk#IntegrityConcept", + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -21711,9 +23548,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.40,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21729,29 +23572,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Concept representing Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "_:N1ff7abd4ef5644bea074696cdfcfd161", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -21770,7 +23629,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21786,13 +23645,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21803,24 +23662,31 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReverseDiscrimination", + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#PotentialRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-30" + "@value": "2024-09-29" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21828,6 +23694,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -21836,36 +23707,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Discrimination" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality" + "@value": "Indicates a concept can potentially be a 'risk source' concept within an use-case" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reverse Discrimination" + "@value": "Potential RiskSource" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#PotentialConsequence" ], "http://purl.org/dc/terms/contributor": [ { @@ -21886,7 +23762,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f" + "@id": "_:Na263f2c7d5914d86a7568447eb141586" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21897,18 +23773,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#PolicyRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Concept representing Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -21919,12 +23795,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "_:N29f432ace74e48e5a8a73e32fb1d4c8f", + "@id": "_:Na263f2c7d5914d86a7568447eb141586", "@type": [ "https://schema.org/WebPage" ], @@ -21940,21 +23822,19 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk#IdentityVerificationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -21970,52 +23850,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ServiceRelatedConsequence" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Concept representing failure to verify identity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Identity Verification Failure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", "https://w3id.org/dpv/risk#PotentialImpact" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-10-21" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22031,13 +23901,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RightsImpact" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A limitation or restrictions on the scope or exercise of rights" + "@value": "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -22048,51 +23918,36 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Societal Risk Concept" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" + "@value": "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#ThreatSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -22101,62 +23956,43 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { - "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right" - } - ] - }, - { - "@id": "_:N6ec056b8005a44a48b4e0542b09105e6", - "@type": [ - "https://schema.org/WebPage" + "@language": "en", + "@value": "Source of threat event, including both agent and non-agent sources" + } ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-30" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22172,78 +24008,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.ttl" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#Threat", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.10,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -22254,29 +24065,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -22284,8 +24095,7 @@ "https://w3id.org/dpv/risk#PotentialRiskSource", "https://w3id.org/dpv/risk#PotentialRisk", "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#ConfidentialityConcept", - "https://w3id.org/dpv/risk#IntegrityConcept" + "https://w3id.org/dpv/risk#AvailabilityConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -22306,7 +24116,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb" + "@id": "_:N61b2a56f52954abdab1d5175aec3c012" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22322,13 +24132,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MaliciousActivity" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Concept representing Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -22339,12 +24149,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N6eb433c5024843b085be0656a9fc2cbb", + "@id": "_:N61b2a56f52954abdab1d5175aec3c012", "@type": [ "https://schema.org/WebPage" ], @@ -22360,14 +24176,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -22377,13 +24190,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22399,60 +24211,106 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataBias", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRiskSource", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-09-13" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "ISO/IEC 24027:2021" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Risk is Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#GroupRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept", + "https://w3id.org/dpv/risk#PotentialRisk", + "https://w3id.org/dpv/risk#PotentialConsequence", + "https://w3id.org/dpv/risk#PotentialImpact" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -22466,13 +24324,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Bias" + "@id": "https://w3id.org/dpv/risk#SocietalRiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + "@value": "Risks and issues that affect or have the potential to affect groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -22483,16 +24341,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Bias" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -22502,7 +24360,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -22518,36 +24381,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", + "@id": "https://w3id.org/dpv/risk#causedByThreat", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept", - "https://w3id.org/dpv/risk#PotentialRisk", - "https://w3id.org/dpv/risk#PotentialConsequence", - "https://w3id.org/dpv/risk#PotentialImpact" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -22560,20 +24430,26 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@language": "en", + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-taxonomy-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] } diff --git a/2.1-dev/risk/risk.n3 b/2.1-dev/risk/risk.n3 index 21d4791d7..89cd8bae1 100644 --- a/2.1-dev/risk/risk.n3 +++ b/2.1-dev/risk/risk.n3 @@ -144,7 +144,7 @@ risk:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . @@ -178,7 +178,7 @@ risk:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -242,9 +242,10 @@ risk:Benefit a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Compensation ; - skos:definition "Something that acts as or causes benefits"@en ; + skos:definition "Concept representing benefits - both material and immaterial"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Benefit"@en . + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk:Bias a rdfs:Class, skos:Concept, @@ -257,7 +258,7 @@ risk:Bias a rdfs:Class, dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Bias"@en . @@ -278,7 +279,7 @@ risk:Blackmail a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . @@ -298,7 +299,7 @@ risk:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -356,7 +357,7 @@ risk:Coercion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . @@ -402,7 +403,7 @@ risk:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -417,7 +418,7 @@ risk:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -440,7 +441,7 @@ risk:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . @@ -460,7 +461,7 @@ risk:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -480,7 +481,7 @@ risk:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBreach ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -576,8 +577,9 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Copyright Violation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . @@ -623,10 +625,24 @@ risk:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . +risk:CustomerSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Customer Support Limited"@en . + risk:Damage a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -638,8 +654,8 @@ risk:Damage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . @@ -695,7 +711,7 @@ risk:DataBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityBreach ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . @@ -715,7 +731,7 @@ risk:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -736,6 +752,20 @@ risk:DataProcessingBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Processing Bias"@en . +risk:DelayedApplicationProcessing a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Delayed Application Processing"@en . + risk:DeliberateIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -762,7 +792,7 @@ risk:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -781,14 +811,15 @@ risk:Detriment a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, + risk:PotentialImpact, risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Detriment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . @@ -822,24 +853,33 @@ risk:DisabilityDiscrimination a rdfs:Class, risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept, - risk:SocietalRisk ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . +risk:DisproportionateEnergyConsumption a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -855,10 +895,24 @@ risk:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DenialServiceAttack ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . +risk:Earthquake a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Earthquake"@en . + risk:EnvironmentalIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -876,9 +930,10 @@ risk:EnvironmentalRisk a rdfs:Class, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . @@ -899,7 +954,7 @@ risk:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -920,12 +975,12 @@ risk:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:ErroneousSystemUse a rdfs:Class, +risk:ErroneousUse a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -940,9 +995,9 @@ risk:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; + skos:definition "Concept representing erroneous use (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erroneous System Use"@en . + skos:prefLabel "Erroneous Use"@en . risk:EthnicDiscrimination a rdfs:Class, skos:Concept, @@ -986,8 +1041,8 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Harmful Speech"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -998,7 +1053,7 @@ risk:ExternalSecurityThreat a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . @@ -1019,7 +1074,7 @@ risk:Extorsion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . @@ -1113,9 +1168,10 @@ risk:FinancialImpact a rdfs:Class, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . @@ -1135,10 +1191,24 @@ risk:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . +risk:Floods a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Floods"@en . + risk:Fraud a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1155,7 +1225,7 @@ risk:Fraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . @@ -1203,6 +1273,19 @@ risk:GroupAttributionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Group Attribution Bias"@en . +risk:GroupRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Societal Risk"@en . + risk:HaltSource a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -1239,7 +1322,7 @@ risk:Harm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -1321,7 +1404,7 @@ risk:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . @@ -1352,7 +1435,7 @@ risk:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . @@ -1372,10 +1455,24 @@ risk:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . +risk:IdentityVerificationFailure a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Identity Verification Failure"@en . + risk:IllegalDataProcessing a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1389,8 +1486,8 @@ risk:IllegalDataProcessing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1439,6 +1536,90 @@ risk:InGroupBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "In-Group Bias"@en . +risk:InabilityToEnterIntoContract a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk:InabilityToEstablishLegalClaims a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk:InabilityToFulfillLegalObligations a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk:InabilityToProcessPayments a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Process Payments"@en . + +risk:InabilityToProtectVitalInterests a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk:InabilityToProvideHealthCare a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1739,11 +1920,13 @@ risk:IndividualHealthSafety a rdfs:Class, risk:IndividualRisk a rdfs:Class, skos:Concept, + dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . @@ -1779,7 +1962,7 @@ risk:Injury a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . @@ -1828,7 +2011,7 @@ risk:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . @@ -1848,7 +2031,7 @@ risk:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1893,17 +2076,60 @@ risk:LanguageDiscrimination a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Language Discrimination"@en . -risk:LegalRisk a rdfs:Class, +risk:LegalComplianceRisk a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk:LegalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Legal Risk"@en . + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk:LegalSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Support Limited"@en . + +risk:LegallyRelevantConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legally Relevant Consequence"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, @@ -1920,7 +2146,7 @@ risk:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . @@ -1939,7 +2165,7 @@ risk:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . @@ -1958,7 +2184,7 @@ risk:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . @@ -1977,7 +2203,7 @@ risk:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . @@ -1996,7 +2222,7 @@ risk:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . @@ -2015,7 +2241,7 @@ risk:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . @@ -2034,7 +2260,7 @@ risk:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . @@ -2086,6 +2312,20 @@ risk:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk:LoyaltyProgramExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk:MaliciousActivity a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2116,7 +2356,7 @@ risk:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -2137,7 +2377,7 @@ risk:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . @@ -2152,8 +2392,8 @@ risk:MaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2198,7 +2438,7 @@ risk:Misuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . @@ -2360,8 +2600,8 @@ risk:NonMaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2405,11 +2645,27 @@ risk:OperationalSecurityRisk a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OrganisationalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk:OutGroupHomogeneityBias a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -2456,11 +2712,39 @@ risk:PersonalSafetyEndangerment a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . +risk:PersonalisationDisabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Disabled"@en . + +risk:PersonalisationEnabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Enabled"@en . + risk:PhishingScam a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2477,7 +2761,7 @@ risk:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . @@ -2496,7 +2780,7 @@ risk:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . @@ -2512,6 +2796,18 @@ risk:PhysicalHarm a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . +risk:PolicyRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Policy Risk"@en . + risk:PotentialConsequence a rdfs:Class, skos:Concept ; dct:contributor "Harshvardhan J. Pandit" ; @@ -2591,7 +2887,7 @@ risk:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . @@ -2608,11 +2904,25 @@ risk:PublicOrderBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Public Order Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . +risk:PublicServicesExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Public Services Exclusion"@en . + risk:RM3x3S1L1 a rdfs:Class, skos:Concept, risk:RiskAnalysis ; @@ -3779,7 +4089,7 @@ risk:Reidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -3869,7 +4179,7 @@ risk:ReputationalRisk a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . @@ -3921,7 +4231,7 @@ risk:Reward a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . -risk:RightEroded a rdfs:Class, +risk:RightsDenied a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -3930,26 +4240,12 @@ risk:RightEroded a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk:RightObstructed a rdfs:Class, - skos:Concept, - dpv:RiskConcept, - risk:PotentialConsequence, - risk:PotentialImpact, - risk:PotentialRisk ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RightsImpact ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsDenial a rdfs:Class, +risk:RightsEroded a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -3958,12 +4254,12 @@ risk:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsExercisePrevention a rdfs:Class, +risk:RightsExercisePrevented a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -3977,7 +4273,7 @@ risk:RightsExercisePrevention a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, @@ -3994,13 +4290,13 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Concept representing Impact to Rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsLimitation a rdfs:Class, +risk:RightsLimited a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -4014,9 +4310,23 @@ risk:RightsLimitation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk:RightsObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsUnfulfilled a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -4028,10 +4338,10 @@ risk:RightsUnfulfilled a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsViolation a rdfs:Class, +risk:RightsViolated a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -4045,7 +4355,7 @@ risk:RightsViolation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RiskAnalysis a rdfs:Class, @@ -4195,7 +4505,7 @@ risk:Sabotage a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . @@ -4231,7 +4541,7 @@ risk:Scam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . @@ -4246,7 +4556,7 @@ risk:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . @@ -4268,7 +4578,7 @@ risk:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . @@ -4288,6 +4598,173 @@ risk:SelectionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Selection Bias"@en . +risk:ServiceAlternativeOffered a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Alternative Offered"@en . + +risk:ServiceCostIncreased a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Cost Increased"@en . + +risk:ServiceDenied a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Denied"@en . + +risk:ServiceLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Limited"@en . + +risk:ServiceNotProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Not Provided"@en . + +risk:ServicePartiallyProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Partially Provided"@en . + +risk:ServiceProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provided"@en . + +risk:ServiceProvisionDelayed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provision Delayed"@en . + +risk:ServiceQualityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Quality Reduced"@en . + +risk:ServiceRelatedConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:OrganisationalRiskConcept ; + skos:definition "A consequence related to the provision of a service"@en ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:ServiceSecurityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Security Reduced"@en . + +risk:ServiceTermination a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Termination"@en . + risk:SexDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -4357,7 +4834,7 @@ risk:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . @@ -4400,8 +4877,8 @@ risk:SocialDisadvantage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . @@ -4429,22 +4906,25 @@ risk:SocietalHealthSafety a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; + skos:broader risk:GroupRisk ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . -risk:SocietalRisk a rdfs:Class, +risk:SocietalRiskConcept a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, - risk:PotentialRisk ; + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Societal Risk"@en . + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk:SourceControl a rdfs:Class, skos:Concept, @@ -4475,7 +4955,7 @@ risk:Spoofing a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . @@ -4511,7 +4991,7 @@ risk:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -4533,7 +5013,7 @@ risk:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . @@ -4553,11 +5033,27 @@ risk:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk:TechnicalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk:Terrorism a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -4572,8 +5068,8 @@ risk:Terrorism a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Terrorism"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . @@ -4630,7 +5126,7 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -4646,7 +5142,7 @@ risk:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -4667,7 +5163,7 @@ risk:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -4687,7 +5183,7 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -4707,7 +5203,7 @@ risk:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -4727,7 +5223,7 @@ risk:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -4747,7 +5243,7 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -4767,7 +5263,7 @@ risk:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -4787,7 +5283,7 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -4804,7 +5300,7 @@ risk:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -4824,7 +5320,7 @@ risk:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -4845,7 +5341,7 @@ risk:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -4865,7 +5361,7 @@ risk:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -4886,7 +5382,7 @@ risk:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -4907,7 +5403,7 @@ risk:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -4927,7 +5423,7 @@ risk:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -4938,7 +5434,7 @@ risk:UserRisks a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . @@ -5046,8 +5542,8 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -5065,10 +5561,11 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, @@ -5084,8 +5581,8 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -5103,12 +5600,26 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk:ViolatingObligation a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Obligation"@en . + risk:ViolatingPolicy a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -5116,11 +5627,24 @@ risk:ViolatingPolicy a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . +risk:ViolatingProhibition a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Prohibition"@en . + risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -5134,10 +5658,11 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, @@ -5155,7 +5680,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/risk/risk.rdf b/2.1-dev/risk/risk.rdf index 4d8070481..4148e57ed 100644 --- a/2.1-dev/risk/risk.rdf +++ b/2.1-dev/risk/risk.rdf @@ -13,78 +13,21 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - + - - - - - Cryptojacking - Something that acts as or causes Cryptojacking - - + + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.51,xsd:decimal 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - - Monitor Impact - Control that monitors a Risk Impact - - 2024-05-19 accepted Harshvardhan J. Pandit - - - - - - - - - - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large - - accepted - - - - - - - Risk Source - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - - - 2024-02-14 - 2024-08-16 - accepted - - - - - - - - - - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - - accepted - - + - + @@ -92,10 +35,12 @@ - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - + + + Security Breach + Concept representing Security Breach + + 2022-08-17 2024-08-16 accepted @@ -103,397 +48,338 @@ - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data - - This concept was called "IllegalProcessingData" in DPV 2.0 - - 2022-08-17 + + Harm + Concept representing Harm to humans + + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - - - - - Monitor Control - Risk Mitigation Measure that uses controls to monitor events - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - + - - Component Failure - Something that acts as or causes Component Failure - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - 0.29,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 0.43,xsd:decimal + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - - - Risk Concepts - N3 serialiation - - + - - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.32,xsd:decimal - 2022-08-17 + + Moderate Risk + Level where Risk is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Financial Impact - Things that cause or have the potential to impact financial resources + Earthquake + The occurence or potential occurence of earthquakes + 2024-10-21 accepted - + - - + - Intentional Misuse - Intentional Misuse - + + Age Discrimination + Discrimination based on a person's age, often impacting older or younger individuals + + 2024-09-30 accepted - + - - - Re-identification - Something that acts as or causes Re-identification - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 + Violating Legal Obligation + Concept representing Violation of Legal Obligations + + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.37,xsd:decimal + + + + + + + Sabotage + Concept representing Sabotage + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM3x3 S:3 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.67,xsd:decimal - 2022-08-17 + + + + + Non-Normality Bias + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + + - - Unfulfilment of Rights - Failure to meet or complete the fulfilment of rights - - Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + + System Failure + Concept representing System Failure + + Here system refers to both hardware and software systems + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Integrity Concept - Indicates a concept is relevant to 'Integrity' in CIA InfoSec model - - - This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact - 2024-09-29 - accepted - Harshvardhan J. Pandit - - - - - - - - Very High Severity - Level where Severity is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + + + + Caste Discrimination + Discrimination based on a person's caste, a form of social stratification found in some cultures + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - - - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure - - - 2022-08-17 - 2024-08-16 + + Individual Health & Safety + accepted - Harshvardhan J. Pandit - - - - - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 - accepted + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-08-18 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Rob Brennan Harshvardhan J. Pandit - - + Georg P. Krog + Fajar Ekaputra + Julio Fernandez + Daniel Doherty + Axel Polleres + Beatriz Esteves + Julian Flake + Delaram Golpayegani + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + - - - - - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 - 2024-08-16 + Service Not Provided + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - - - - - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - - - - - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + - - - - - Security Breach - Something that acts as or causes Security Breach - - - 2022-08-17 - 2024-08-16 + User Risks + Concepts associated with risks that arise due to User or Human use + accepted - Harshvardhan J. Pandit - + - - Low Severity - Level where Severity is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + + + + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity + Lose of Negotiating Capacity + Concept representing Loss of Negotiating Capacity - + 2022-08-17 2024-08-16 accepted @@ -501,43 +387,40 @@ - + - Limitation of Rights - A limitation or restrictions on the scope or exercise of rights - - This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2022-08-18 - 2024-08-16 + Service Security Reduced + Stub + + 2024-10-21 accepted - Georg P. Krog, Harshvardhan J. Pandit - + - Physical Assault - Something that acts as or causes Physical Assault - - - 2022-08-17 + Rights Limited + A limitation or restrictions on the scope or exercise of rights + + This concept was called "LimitationOfRights" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + @@ -545,11 +428,10 @@ - - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access - - + Identity Fraud + Concept representing Identity Fraud + + 2022-08-17 2024-08-16 accepted @@ -574,107 +456,48 @@ - + - - Identity Fraud - Something that acts as or causes Identity Fraud - - - 2022-08-17 - 2024-08-16 + + accepted - Harshvardhan J. Pandit - - - - - - Risk Concepts - http://purl.org/ontology/bibo/status/published - RISK - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2022-08-14 - 2022-08-14 - 2024-08-18 - Harshvardhan J. Pandit - Georg P. Krog - Paul Ryan - Rob Brennan - Delaram Golpayegani - Beatriz Esteves - Julian Flake - 2.1-dev - 2.1-dev - https://w3id.org/dpv/risk - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - 10.5281/zenodo.12505841 - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - - - Delaram Golpayegani - Harshvardhan J. Pandit - Beatriz Esteves - Georg P. Krog - Julio Fernandez - Axel Polleres - Rob Brennan - Fajar Ekaputra - Julian Flake - Daniel Doherty - - risk - https://w3id.org/dpv/risk# - - - - - - - - - - - - - + - - Misuse - Something that acts as or causes Misuse - - 2024-06-11 + + Lose of Credibility + Concept representing Loss of Credibility + + + 2022-08-17 2024-08-16 accepted - Delaram Golpayegani + Harshvardhan J. Pandit - + - - - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - + + Personal Safety Endangerment + Concept representing Personal Safety Endangerment + + 2022-08-17 2024-08-16 accepted @@ -682,92 +505,131 @@ - + + + + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + + 2024-02-14 + accepted + + + + - - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.36,xsd:decimal + + + + + Lose of Opportunity + Concept representing Loss of Opportunity + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - + - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - - - 2024-02-14 + + + + + + + Legal Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process + + Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation + 2024-10-21 accepted - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + + + + + Unauthorised Information Disclosure + Concept representing Unauthorised Information Disclosure + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + - + - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - 0.37,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Monitor Risk Source - Control that monitors a Risk Source - - 2024-05-19 + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - - 2024-05-19 + + + + + Lose of Trust + Concept representing Loss of Trust + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + + - - Terrorism - Something that acts as or causes Terrorism - - + + Unauthorised Data Modification + Concept representing Unauthorised Data Modification + + 2022-08-17 2024-08-16 accepted @@ -775,285 +637,242 @@ - + - - Consequence Control - Risk Mitigation Measure that controls the Consequences - + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:4 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.41,xsd:decimal + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - - - - Prevent Exercising of Rights - Actions or measures that prevent an individual or group from exercising their legal rights. - - This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2022-08-18 - 2024-08-16 + + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.32,xsd:decimal + 2022-08-17 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.10,xsd:decimal + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Geographic Discrimination - Discrimination based on a person's geographical origin or residence - - 2024-09-30 + Legal Support Limited + Stub + + 2024-10-21 accepted - + - - - - - - Intercept Communications - Something that acts as or causes Interception of Communications - - This concept was called "InterceptionCommunications" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit - - - - - - - - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - - 0.29,xsd:decimal - 2022-08-17 + + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - - - - - Extremely Low Likelihood - Level where Likelihood is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - - 2022-08-18 + + Change Impact + Control that changes Impact + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - - 2022-08-17 + + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - - - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - - 2022-08-17 - 2024-08-16 + Violating Policy + Concept representing violation of policy which can be either internal or external policy + accepted - Harshvardhan J. Pandit - + - + - Religious Discrimination - Discrimination based on a person's religious beliefs or practices - - 2024-09-30 + Psychological Harm + Concept representing Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - - - 2024-05-19 + + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring - - 2024-02-14 + + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Moderate Severity - Level where Severity is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + + + + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted - Harshvardhan J. Pandit - + - + - + - Confounding Variables Bias - Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association - - ISO/IEC 24027:2021 - 2024-09-13 + + Unauthorised Data Access + Concept representing Unauthorised Data Access + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + + + + + Service Cost Increased + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + - - - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - + + Rights Impact + Concept representing Impact to Rights + + This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-17 2024-08-16 accepted @@ -1061,175 +880,285 @@ - + - Potential RiskSource - Indicates a concept can potentially be a 'risk source' concept within an use-case - - - PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - 2024-09-29 + + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - - - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - - 2024-02-14 + + + + + Social Disadvantage + Concept representing Social Disadvantage + + 2022-08-19 + 2024-08-16 accepted + Georg P. Krog - + - + - Payment - Something that acts as or provides payment e.g. to access a service or purchase resources - - 2024-04-14 + Physical Assault + Concept representing Physical Assault + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.02,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - Risk Concepts - Turtle serialiation - - + + + + + + + + + Component Failure + Concept representing Component Failure + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + accepted + + + + + + + + Reduce Likelihood + Control that reduces the likelihood of an event + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + + + Unwanted Data Deletion + Concept representing Unwanted Data Deletion + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + + + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - - 0.60,xsd:decimal + Very High Risk (RM7x7 S:7 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + + 0.57,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - - 0.24,xsd:decimal + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + Malicious Activity + Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others + + accepted + + + + + + + + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + 0.49,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + + Monitor Risk Source + Control that monitors a Risk Source + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + - Caste Discrimination - Discrimination based on a person's caste, a form of social stratification found in some cultures - + Homophobia + Hostility or prejudice against individuals who are or are perceived to be homosexual + 2024-09-30 accepted - + + + + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 + accepted + + + + + + + + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.67,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Statistical Bias - Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates - - ISO 20501:2019 + Bias + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + ISO/IEC 24027:2021 2024-09-13 accepted Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + - + @@ -1237,30 +1166,56 @@ - - Sabotage - Something that acts as or causes Sabotage - - + Data Corruption + Concept representing Corruption of Data + + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + + + + + + + + Racial Discrimination + Discrimination against individuals because of their racial background or skin color + + 2024-09-30 + accepted + + + + + + + + Incident Ongoing + The incident is ongoing i.e. still active + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + - - - Extorsion - Something that acts as or causes Extorsion - - + Public Order Breach + Concept representing Public Order Breach + + 2022-08-17 2024-08-16 accepted @@ -1279,9 +1234,9 @@ Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser + Concept representing a compromised account that is then used by the compromiser - + 2022-08-17 2024-08-16 accepted @@ -1289,26 +1244,30 @@ - + - - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.12,xsd:decimal + + + + Violating Ethics Code + Concept representing Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - Monitor Risk - Control that monitors a Risk + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability 2024-05-19 accepted @@ -1316,164 +1275,147 @@ - - - - - Containment Control - Control to contain event - - 2024-05-19 - accepted - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - Availability Incident - Incident where the availability of information or system has been affected - - - 2024-05-19 - accepted - - - - + - - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 + Violating Contractual Obligation + Concept representing Violation of Contractual Obligations + + + This concept was called "ViolationContractualObligations" in DPV 2.0 + + 2022-08-17 2024-08-16 - accepted - Georg P. Krog, Harshvardhan J. Pandit + modified + Harshvardhan J. Pandit - + - - Incident Status Unknown - The status of a incident is unknown - - 2024-02-14 + + + + + Intentional Misuse + Concept represent an intentional misuse (of something) + accepted - Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.18,xsd:decimal - 2022-08-17 + + Very Low Likelihood + Level where Likelihood is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - - 0.86,xsd:decimal - 2022-08-17 + + + + + Rights Obstructed + Interference with or blocking of the exercise of rights + + In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Harshvardhan J. Pandit - + - + - - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.31,xsd:decimal - 2022-08-17 + + Detection Control + Control to detect event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Confidentiality Concept - Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model - - - This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact - 2024-09-29 + + + + + Sexism + Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Misandry - Dislike, contempt, or prejudice against men + Gender Discrimination + Discrimination based on a person's gender identity or gender expression 2024-09-30 accepted - + - - - - - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises - - + + Lose of Reputation + Concept representing Loss of Reputation + + 2022-08-17 2024-08-16 accepted @@ -1481,139 +1423,160 @@ - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + + + Incident Detection Report + A report describing the detection of a Incident + + + 2024-05-19 + accepted + + + + + - - - Judicial Costs - Something that involves or causes judicial costs to be paid - + + Cryptojacking + Concept representing Cryptojacking + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - - - Excellence Discrimination - Favoritism towards individuals deemed more competent or superior, often at the expense of others - - 2024-09-30 + + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.60,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + + + + + + + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + + - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society + Organisational Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process + Organisational in this context refers to an organisation which is not human but is managed by humans + 2024-10-21 accepted - + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + + Loyalty Program Exclusion + Stub + + 2024-10-21 + accepted - - + - has incident - Indicates an incident is associated with the specified context - - - 2024-02-14 + + + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + + 0.14,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - - - - has control - Indicates the use of specified control - - - 2024-02-14 - accepted - - - - - + - - - - - Sexual Harassment - + + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.18,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - High Risk - Level where Risk is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + Integrity Concept + Indicates a concept is relevant to 'Integrity' in CIA InfoSec model + + + This concept allows indicating the applicability of Integrity dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - IEC 31010:2019 - https://www.iso.org/standard/72140.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + + - - Impact to Rights - Something that acts as or causes Impact to Rights - - This concept was called "ImpactToRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - + + Identity Theft + Concept representing Identity Theft + + 2022-08-17 2024-08-16 accepted @@ -1621,94 +1584,101 @@ - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - 0.14,xsd:decimal + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - - Fraud - Something that acts as or causes Fraud - - - 2022-08-17 + + Non-Material Damage + Concept representing Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - + - Availability Concept - Indicates a concept is relevant to 'Availability' in CIA InfoSec model - - - This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact - 2024-09-29 + + Incident Status Unknown + The status of a incident is unknown + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Avoid Source - Control that avoids the risk source - - 2024-05-19 + + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + - + - - - - - - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification - - - 2022-08-17 - 2024-08-16 + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ @@ -1724,193 +1694,229 @@ - + - Potential Impact - Indicates a concept can potentially be a 'impact' concept within an use-case - - - PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - 2024-09-29 - accepted - Harshvardhan J. Pandit - - - - - - - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - - 2024-02-14 + + + + + Customer Support Limited + Concept representing customer support to be limited + + 2024-10-21 accepted - + - + - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - - 0.14,xsd:decimal + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - External Security Threat - Concepts associated with security threats that are likely to originate externally - + + + + Service Provided + Stub + + 2024-10-21 accepted - + - - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low - - 2022-08-18 + + + + + Excellence Discrimination + Favoritism towards individuals deemed more competent or superior, often at the expense of others + + 2024-09-30 accepted - Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal - 2022-08-17 + + + + + Financial Impact + Things that cause or have the potential to impact financial resources + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + - - - - - Data Breach - Something that acts as or causes Data Breach - - + + Lose of Customer Confidence + Concept representing Loss of Customer Confidence + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - + - - - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - 2022-08-17 - 2024-08-16 + + Damage + Concept representing Damage + + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + - Obstruction of Rights - Interference with or blocking of the exercise of rights - - In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Violence against children + Concept representing Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - - 2022-08-17 - 2024-08-16 + Discrimination + Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate + + 2024-09-30 + accepted + Georg P. Krog + + + + + + + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit + + + + + + + + + + Direct Discrimination + Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) + + 2024-09-30 + accepted + - - + - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 + + + + + + Ethnic Discrimination + Discrimination against individuals based on their ethnicity or cultural heritage + + 2024-09-30 accepted - - + - + - - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + + + + Requirements Bias + Bias that occurs in or during requirements creation + + Requirements bias also represents occasions for the human cognitive biases to manifest + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + + + + + + + + + + Data Processing Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + @@ -1921,9 +1927,9 @@ Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use + Concept representing Unauthorised Resource Use - + 2022-08-17 2024-08-16 accepted @@ -1931,857 +1937,896 @@ - + - - - - - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 - 2024-08-16 + Integrity Incident + Incident where the integrity of information or system has been affected + + + 2024-05-19 accepted - Georg P. Krog - + - + - + - Non-Response Bias - Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias - - ISO/IEC 24027:2021 - 2024-09-13 + + Unauthorised Code Disclosure + Concept representing Unauthorised Code Disclosure + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Monitor Consequence - Control that monitors a Risk Consequence - - 2024-05-19 + + + + + Harassment + accepted - Harshvardhan J. Pandit - + - + - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - 0.16,xsd:decimal + 0.02,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.08,xsd:decimal + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.49,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Data Processing Bias - Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - - ISO/IEC 24027:2021 - 2024-09-13 + Human Errors + Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - Very High Likelihood - Level where Likelihood is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 + + + + + Denial of Service Attack (DoS) + Concept representing Denial of Service Attack (DoS) + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + + Extremely Low Likelihood + Level where Likelihood is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Recovery Control - Control to recover from event - - 2024-05-19 - accepted - - - - - - - - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 + + + + + Rule-Based System Design + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + Rule based system design also potentially introduces various forms of human cognitive bias + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - 0.24,xsd:decimal + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - - 2022-08-18 + + + + Violating Prohibition + Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence - - - 2022-08-17 + Benefit + Concept representing benefits - both material and immaterial + + Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + + + + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + + + 2024-05-19 + accepted + + + + + + + + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate + + 0.29,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - - - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - 2022-08-17 - 2024-08-16 + + Judicial Costs + Something that involves or causes judicial costs to be paid + accepted - Harshvardhan J. Pandit - + + + + + + + Risk Concepts - RDF/XML serialiation + + - - Incident Ongoing - The incident is ongoing i.e. still active - - 2024-02-14 + + + + + Inability to Establish Legal Claims + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - 0.24,xsd:decimal + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Risk Matrix 5x5 - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - - 2022-08-17 + + Very High Severity + Level where Severity is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - + - Coverage Bias - Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used - - ISO/IEC 24027:2021 - 2024-09-13 + + Coercion + Concept representing Coercion + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - - Accidental Misuse - Accidental Misuse - + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - + - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.48,xsd:decimal + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 - accepted - - - - + - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - 0.08,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form - - 2024-04-14 + + System Malfunction + Concept representing System Malfunction + + Here system refers to both hardware and software systems + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Threat Source - Source of threat event, including both agent and non-agent sources - - 2024-02-14 + + + + + Identity Verification Failure + Concept representing failure to verify identity + + 2024-10-21 accepted - + - + - - + - Requirements Bias - Bias that occurs in or during requirements creation - - Requirements bias also represents occasions for the human cognitive biases to manifest - ISO/IEC 24027:2021 - 2024-09-13 + + Rights Unfulfilled + Failure to meet or complete the fulfilment of rights + + Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Potential Consequence - Indicates a concept can potentially be a 'consequence concept within an use-case - - - PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - 2024-09-29 + + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - - - - - Blackmail - Something that acts as or causes Blackmail - - - 2022-08-17 - 2024-08-16 + + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - - - - - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - + + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.32,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - - - - - Language Discrimination - Discrimination based on a person's language, often linked to national origin or ethnicity - - 2024-09-30 - accepted - - + - + + - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - + + Confidentiality Breach + Concept representing Confidentiality Breach + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Misogyny - Dislike, contempt, or prejudice against women - - 2024-09-30 + Service Alternative Offered + Stub + + 2024-10-21 accepted - + - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.71,xsd:decimal + 0.86,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + - - - - - Transphobia - Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms - - 2024-09-30 + Incident + An actual or occured event + + + + Incident is realised or materialised risk + 2024-02-14 + 2024-05-19 + 2024-08-16 accepted + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - + + - + - Moderate Risk - Level where Risk is Moderate + Low Risk + Level where Risk is Low - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - High Risk (RM7x7 S:5 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.41,xsd:decimal - 2022-08-17 + + + + + Detriment + Concept representing Detriment + + 2022-03-23 + 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - + - - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + + + + + + Malicious Code Attack + Concept representing Malicious Code Attack + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.44,xsd:decimal + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - - Bias - Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others - - ISO/IEC 24027:2021 - 2024-09-13 + + Indirect Discrimination + Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified + + 2024-09-30 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - 0.80,xsd:decimal - 2022-08-17 + + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - + + Consequence Control + Risk Mitigation Measure that controls the Consequences + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - - - - Sex Discrimination - Discrimination based on a person's biological sex - - 2024-09-30 + + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - + + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 + + + + + Disability Discrimination + Discrimination against individuals based on physical or mental disabilities + + 2024-09-30 accepted - + - + - Ethnic Discrimination - Discrimination against individuals based on their ethnicity or cultural heritage - + Religious Discrimination + Discrimination based on a person's religious beliefs or practices + 2024-09-30 accepted - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + 2024-05-19 + accepted + Harshvardhan J. Pandit + + - + - - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.40,xsd:decimal + + + + + Distributed Denial of Service Attack (DDoS) + Concept representing Distributed Denial of Service Attack (DDoS) + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Change Consequence - Control that changes Consequence - + Source Control + Risk Mitigation Measure that controls the Source + 2024-05-19 accepted Harshvardhan J. Pandit - + + - - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + Accidental Misuse + Concept representing accidental misuse (of something) + accepted - Harshvardhan J. Pandit - + - Potential Risk - Indicates a concept can potentially be a 'risk' concept within an use-case - - - PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case - 2024-09-29 + + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - Deliberate Incident - Incident caused due to deliberate actions of a human - - + + Containment Control + Control to contain event + 2024-05-19 accepted - + - + - + + - - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - - 2022-08-17 - 2024-08-16 + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - 0.10,xsd:decimal + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.36,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal - 2022-08-17 + + Very High Likelihood + Level where Likelihood is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + - - Lose of Trust - Something that acts as or causes Loss of Trust - - + + Blackmail + Concept representing Blackmail + + 2022-08-17 2024-08-16 accepted @@ -2789,201 +2834,215 @@ - + + - Privacy - + Societal Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process + + Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure + 2024-10-21 accepted - + - - Reduce Severity - Control that reduces the severity of an event - - 2024-05-19 + + + + + + Technical Risk Concept + Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process + + Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + - - - + Operational Security Risk + Risks and issues that arise during operational processes + accepted - + - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Risk Analysis - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - - - 2022-08-18 + + + + + Societal Risk + Risks and issues that affect or have the potential to affect groups in society + accepted - Harshvardhan J. Pandit - + - + + - - - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + has control + Indicates the use of specified control + + + 2024-02-14 accepted - Harshvardhan J. Pandit + - + - + - - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - - 2024-05-19 + + + + + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - + - - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - - 0.31,xsd:decimal - 2022-08-17 + + + + + Payment + Something that acts as or provides payment e.g. to access a service or purchase resources + + 2024-04-14 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - - - - - - - Risk Concepts - RDF/XML serialiation + + + + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + + 2024-02-14 + accepted + + - + - - - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - - 2022-08-17 + + + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 - 2024-08-16 + Misandry + Dislike, contempt, or prejudice against men + + 2024-09-30 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - - - - - - - Malware Attack - Something that acts as or causes Malware Attack - - + + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + + 0.80,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + + Personalisation Disabled + Stub + + 2024-10-21 + accepted - + @@ -2991,10 +3050,10 @@ - Scam - Something that acts as or causes Scam + Extorsion + Concept representing Extorsion - + 2022-08-17 2024-08-16 accepted @@ -3002,48 +3061,46 @@ - - - - - - - - Racism - Prejudice or discrimination against people based on their race - - 2024-09-30 - accepted - - - - + - Very High Risk (RM7x7 S:7 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - 0.57,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - - - - System Intrusion - Something that acts as or causes System Intrusion - - + + + Service Partially Provided + Stub + + 2024-10-21 + accepted + + + + + + + + + + Illegal Data Processing + Concept representing Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2022-08-17 2024-08-16 accepted @@ -3051,21 +3108,21 @@ - + - - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.51,xsd:decimal - 2022-08-17 + Potential RiskSource + Indicates a concept can potentially be a 'risk source' concept within an use-case + + + PotentialRiskSource is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - + - + @@ -3073,11 +3130,11 @@ - System Malfunction - Something that acts as or causes System Malfunction + Equipment Malfunction + Concept representing Equipment Malfunction - Here system refers to both hardware and software systems - + Here equipment refers to physical equipment + 2022-08-17 2024-08-16 accepted @@ -3085,48 +3142,76 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - + - Confirmation Bias - Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - - ISO/IEC 24027:2021 - 2024-09-13 + + accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - - - - Racial Discrimination - Discrimination against individuals because of their racial background or skin color - - 2024-09-30 + + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.64,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + + + + + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + + 0.29,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + - Group Attribution Bias - Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group - + Data Bias + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + ISO/IEC 24027:2021 2024-09-13 accepted @@ -3134,147 +3219,100 @@ - + - Environmental Incident - Incident caused due to environmental factors outside human controls - - + + Recovery Control + Control to recover from event + 2024-05-19 accepted - + - + - Moderate Risk (RM3x3 S:3 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.33,xsd:decimal + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Discrimination - Something that acts as or causes Discrimination - Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate - - - 2022-08-19 + Misogyny + Dislike, contempt, or prejudice against women + 2024-09-30 - 2024-08-16 accepted - Georg P. Krog - - - - - Remove Impact - Control that removes Impact i.e. prevents it from materialising - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - - - Data Corruption - Something that acts as or causes Corruption of Data - - This concept was called "Corruption Data" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + + Service Termination + Stub + + 2024-10-21 + accepted - + - - - Identity Theft - Something that acts as or causes Identity Theft - - - 2022-08-17 - 2024-08-16 + + Inability to Protect Vital Interests + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.08,xsd:decimal + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Non-Normality Bias - Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution ISO/IEC 24027:2021 2024-09-13 @@ -3283,71 +3321,38 @@ - + - + + - Public Order Breach - Something that acts as or causes Public Order Breach - - - 2022-08-17 - 2024-08-16 + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - Erroneous System Use - Something that acts as or causes Erroneous System Use - - - 2022-08-17 - 2024-08-16 + Violating Obligation + Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract + + 2024-10-21 accepted - Harshvardhan J. Pandit - - - - - Impact Control - Risk Mitigation Measure that controls Impacts - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - - - - - Very High Risk - Level where Risk is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + @@ -3356,10 +3361,10 @@ - Malicious Code Attack - Something that acts as or causes Malicious Code Attack + System Intrusion + Concept representing System Intrusion - + 2022-08-17 2024-08-16 accepted @@ -3367,147 +3372,172 @@ - + + - - Damage - Something that acts as or causes Damage - - 2022-03-30 + + + Unauthorised System Access + Concept representing Unauthorised System Access + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - - 2024-02-14 - accepted - - - - + - Sexism - Discrimination based on a person's sex or gender, typically involving unequal treatment or stereotyping + Racism + Prejudice or discrimination against people based on their race 2024-09-30 accepted - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.61,xsd:decimal - 2022-08-17 + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - 0.33,xsd:decimal + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Reduction Control - Control that reduces the likelihood or severity of an event - + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 accepted - + - + - Incident - An actual or occured event - - - - Incident is realised or materialised risk - 2024-02-14 + + + + + + Component Malfunction + Concept representing Component Malfunction + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + accepted + + + + + + + + Moderate Severity + Level where Severity is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Remove Impact + Control that removes Impact i.e. prevents it from materialising + 2024-05-19 - 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - + Harshvardhan J. Pandit - - + - + - + - Gender Discrimination - Discrimination based on a person's gender identity or gender expression - - 2024-09-30 + Material Damage + Concept representing Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + + + + Halt Source + Control that halts the risk source or prevents it from materialising + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + - Data Bias - Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups - + In-Group Bias + Bias that occurs when showing partiality to one's own group or own characteristics + ISO/IEC 24027:2021 2024-09-13 accepted @@ -3515,72 +3545,71 @@ - - - - - Reduce Likelihood - Control that reduces the likelihood of an event - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + + + + + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - + + - - Indirect Discrimination - Occurs when an apparently neutral provision, criterion, or practice puts individuals of a certain group at a disadvantage compared to others, unless it can be objectively justified - - 2024-09-30 + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - - 2022-08-18 + + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.71,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + + + + + + + Risk Concepts - HTML serialiation + + - Lose of Credibility - Something that acts as or causes Loss of Credibility + Lose of Goodwill + Concept representing Loss of Goodwill - + 2022-08-17 2024-08-16 accepted @@ -3588,34 +3617,54 @@ - + - + - Nationality Discrimination - Discrimination based on a person's nationality or citizenship - - 2024-09-30 + Exposure to Harmful Speech + Concept representing Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + + + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + + 2024-02-14 + accepted + + + + + + - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion + Unauthorised Access to Premises + Concept representing Unauthorised Access to Premises - + 2022-08-17 2024-08-16 accepted @@ -3623,219 +3672,214 @@ - + + + + Deliberate Incident + Incident caused due to deliberate actions of a human + + + 2024-05-19 + accepted + + + + - - - - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - - 2022-08-17 - 2024-08-16 + Policy Risk + Risks and consequences regarding policy and its associated processes + accepted - Harshvardhan J. Pandit - + - - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal - 2022-08-17 + + + + + Rights Denied + The refusal or withholding or denial of the existence or applicability of rights + + The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right accepted - Harshvardhan J. Pandit - + - + - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - - 0.99,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + + 0.71,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Remove Source - Control that removes the risk source - - 2024-05-19 + + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + - - Reputational Risk - Risks and issues that affect the reputation of the organisation - + + Phishing Scam + Concept representing Phishing Scam + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - - 2022-08-17 + Incident Impact Assessment + An impact assessment associated with a incident + + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.49,xsd:decimal + Risk Matrix 5x5 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - - - Homophobia - Hostility or prejudice against individuals who are or are perceived to be homosexual - - 2024-09-30 - accepted - - - - + + - - - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 + + + Authorisation Failure + Concept representing Authorisation Failure + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + + + - - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + + Fraud + Concept representing Fraud + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - - - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - - 2022-08-17 - 2024-08-16 + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Moderate Likelihood - Level where Likelihood is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + Remedy Control + Control to remedy consequences of event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Human Errors - Something that acts as or causes Human Errors - - + + Injury + Concept representing Injury + + 2022-08-17 2024-08-16 accepted @@ -3843,79 +3887,46 @@ - - - - - Extremely High Severity - Level where Severity is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + - - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.99,xsd:decimal - 2022-08-17 + + Change Consequence + Control that changes Consequence + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - + - - Equipment Failure - Something that acts as or causes Equipment Failure - - Here equipment refers to physical equipment - - 2022-08-17 - 2024-08-16 + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Selection Bias - Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution - + Non-Response Bias + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + ISO/IEC 24027:2021 2024-09-13 accepted @@ -3923,36 +3934,26 @@ - + - + + - - Disability Discrimination - Discrimination against individuals based on physical or mental disabilities - - 2024-09-30 + + Unauthorised Code Modification + Concept representing Unauthorised Code Modification + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - - - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + @@ -3965,70 +3966,79 @@ - + + + + + Monitor Risk + Control that monitors a Risk + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - + - SexualOrientation Discrimination - Discrimination based on a person's sexual orientation, typically against those who are not heterosexual - - 2024-09-30 + Public Services Exclusion + Stub + + 2024-10-21 accepted - + + - - - - - - - Phishing Scam - Something that acts as or causes Phishing Scam - - - 2022-08-17 - 2024-08-16 + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - - - Injury - Something that acts as or causes Injury - - + + + Brute Force Authorisations + Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + 2022-08-17 2024-08-16 accepted @@ -4036,288 +4046,265 @@ - - - - - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - - - + - - Sampling Bias - Bias that occurs when data records are not collected randomly from the intended population - - ISO/IEC 24027:2021 - 2024-09-13 + + Language Discrimination + Discrimination based on a person's language, often linked to national origin or ethnicity + + 2024-09-30 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - Integrity Incident - Incident where the integrity of information or system has been affected - - + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + 2024-05-19 accepted - + - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + + Delayed Application Processing + Concept representing delayed processing of applications + + 2024-10-21 + accepted - + - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - - 2022-08-17 + Rights Exercise Prevented + Actions or measures that prevent an individual or group from exercising their legal rights. + + This concept was called "PreventExercisingOfRights" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + Confidentiality Concept + Indicates a concept is relevant to 'Confidentiality' in CIA InfoSec model + + + This concept allows indicating the applicability of Confidentiality dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - Source Control - Risk Mitigation Measure that controls the Source - + Monitor Impact + Control that monitors a Risk Impact + 2024-05-19 accepted Harshvardhan J. Pandit - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - 0.06,xsd:decimal + 0.43,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - - - - - System Failure - Something that acts as or causes System Failure - - Here system refers to both hardware and software systems - - 2022-08-17 - 2024-08-16 + + Low Severity + Level where Severity is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - - - - - Primer for Data Privacy Vocabulary - - + + + + + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + - Erosion of Rights - The gradual weakening or reduction of the scope and protection of rights - - Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + Personalisation Enabled + Stub + + 2024-10-21 accepted - + - - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.86,xsd:decimal + + + + + + + Malware Attack + Concept representing Malware Attack + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Malicious Activity - Intentional actions designed to harm, exploit, manipulate, or disrupt individuals, systems, or organizations for personal gain or detriment to others - + + + Unauthorised Code Access + Concept representing Unauthorised Code Access + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - - - - Denial of Rights - The refusal or withholding or denial of the existence or applicability of rights - - The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - accepted - - - - - - - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - - 2024-05-19 + Availability Concept + Indicates a concept is relevant to 'Availability' in CIA InfoSec model + + + This concept allows indicating the applicability of Impact dimension to concepts whether they are a risk source, risk, consequence, or impact + 2024-09-29 accepted + Harshvardhan J. Pandit - + - + - Individual Health & Safety - + Financial Loss + Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - - 2024-02-14 + Incident Identifier + Identifier associated with an incident + + 2024-05-19 + accepted + + + + + + + + Monitor Consequence + Control that monitors a Risk Consequence + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + + - - Sexual Violence - Something that acts as or causes Sexual Violence - - - 2022-08-17 + Misuse + Concept representing a misuse (of something) + + 2024-06-11 2024-08-16 accepted - Harshvardhan J. Pandit + Delaram Golpayegani - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - @@ -4332,105 +4319,75 @@ - + - - - - - - Authorisation Failure - Something that acts as or causes Authorisation Failure - - + + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + + 0.10,xsd:decimal 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - - - - - Incident Impact Assessment - An impact assessment associated with a incident - - - 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - Here equipment refers to physical equipment - - 2022-08-17 - 2024-08-16 + + Inability to Fulfill Legal Obligations + Stub + + 2024-10-21 accepted - Harshvardhan J. Pandit - - - - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring - - - 2024-05-19 - accepted - - - - + - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 + + + + + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Incident Status - Status associated with an incident - - - 2024-02-14 + + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.16,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - + - + - Societal Bias - Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information ISO/IEC 24027:2021 2024-09-13 @@ -4439,184 +4396,157 @@ - + - - Very Low Likelihood - Level where Likelihood is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + Potential Risk + Indicates a concept can potentially be a 'risk' concept within an use-case + + + PotentialRisk is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - - Extremely Low Severity - Level where Severity is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + Incident Notice + Notice associated with an Incident + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - + - Rule-Based System Design - Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design - - Rule based system design also potentially introduces various forms of human cognitive bias - ISO/IEC 24027:2021 - 2024-09-13 + + Scam + Concept representing Scam + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - Incident Identifier - Identifier associated with an incident - - 2024-05-19 + + + + + A consequence related to the provision of a service + + 2024-10-21 accepted - + - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + IEC 31010:2019 + https://www.iso.org/standard/72140.html - + - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - 0.04,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations - - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + Erroneous Use + Concept representing erroneous use (of something) + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - - - - - Detection Control - Control to detect event - - 2024-05-19 - accepted - - - - + - - Halt Source - Control that halts the risk source or prevents it from materialising - - 2024-05-19 + + Very Low Risk (RM7x7 S:6 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + + - - Violation of Rights - The infringement or breach of rights in a manner that constitues a 'violation' of those rights - - This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right - 2022-08-18 + + Unauthorised Re-Identification + Concept representing Unauthorised Re-Identification + + 2022-08-19 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Georg P. Krog - - - - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - - 2024-02-14 - accepted - - - - + - Data Aggregation Bias - Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data - + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + ISO/IEC 24027:2021 2024-09-13 accepted @@ -4624,48 +4554,75 @@ - + - - + + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + - In-Group Bias - Bias that occurs when showing partiality to one's own group or own characteristics - - ISO/IEC 24027:2021 - 2024-09-13 - accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Violating Statutory Obligations + Concept representing Violation of Statutory Obligations + + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit - + - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - - 2022-08-18 + + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High + + 0.57,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + + + + + + + Risk Concepts - N3 serialiation + + - - - - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - - + + + Sexual Violence + Concept representing Sexual Violence + + 2022-08-17 2024-08-16 accepted @@ -4673,37 +4630,38 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - - 2024-05-19 + + Very High Risk + Level where Risk is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - + - Out-Group Homogeneity Bias - Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics - - ISO/IEC 24027:2021 - 2024-09-13 + + Unwanted Disclosure of Data + Concept representing Unwanted Disclosure of Data + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit @@ -4717,100 +4675,142 @@ Security Attack - Something that acts as or causes an attack on security with the aim of undermining it + Concept representing an attack on security with the aim of undermining it accepted - + - - Low Risk - Level where Risk is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Remove Source + Control that removes the risk source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - + Incident Status + Status associated with an incident + + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + - Reverse Discrimination - Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality - - 2024-09-30 + Sexual Harassment + accepted - + - - + - Simpson'S Paradox Bias - Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined - - ISO/IEC 24027:2021 - 2024-09-13 + + Rights Violated + The infringement or breach of rights in a manner that constitues a 'violation' of those rights + + This concept was called "ViolationOfRights" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + 2022-08-18 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal - 2022-08-17 - accepted - Harshvardhan J. Pandit - - + + + + + Transphobia + Hostility or prejudice against transgender people or those perceived as not conforming to traditional gender norms + + 2024-09-30 + accepted + + - + - - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - - 0.49,xsd:decimal - 2022-08-17 + Confidentiality Incident + Incident where the confidentiality of information or system has been affected + + + 2024-05-19 + accepted + + + + + + + + + + + Service Quality Reduced + Stub + + 2024-10-21 + accepted + + + + + + + Potential Consequence + Indicates a concept can potentially be a 'consequence concept within an use-case + + + PotentialConsequence is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low 0.06,xsd:decimal 2022-08-17 @@ -4819,258 +4819,343 @@ - + - - + - - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification - - 2022-08-19 - 2024-08-16 + + Reverse Discrimination + Discrimination against members of a majority or historically dominant group, often in the context of efforts to promote equality + + 2024-09-30 accepted - Georg P. Krog - + + + + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + + 2024-02-14 + accepted + + + + - - Identification Control - Control to identify characteristics of event - - 2024-05-19 + + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - - 0.73,xsd:decimal - 2022-08-17 + Potential Impact + Indicates a concept can potentially be a 'impact' concept within an use-case + + + PotentialImpact is a suggestion that the concept can be a 'risk' within an use-case - this suggestion is not exclusive and the concept may also be instances of other potential concepts to indicate the multiple possible roles a concept can take. This suggestion can be ignored if it is not applicable to the use-case + 2024-09-29 accepted Harshvardhan J. Pandit - + - + - - Component Malfunction - Something that acts as or causes Component Malfunction - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + + Unauthorised System Modification + Concept representing Unauthorised System Modification + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + + - - Societal Health & Safety - + + + + Unauthorised Activity + Concept representing Unauthorised Activity + accepted - + + - - Incident Detection Report - A report describing the detection of a Incident - - - 2024-05-19 + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + 2024-02-14 accepted - + - + + + + + + + Risk Concepts - Turtle serialiation + + + + + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + + 2024-02-14 + accepted + + + + - + - Implicit Bias - Bias that occurs when a human makes an association or assumption based on their mental models and memories - - ISO/IEC 24027:2021 - 2024-09-13 + + + Spoofing + Concept representing Spoofing + + + 2022-08-17 + 2024-08-16 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.80,xsd:decimal - 2022-08-17 + + Monitor Control + Control that monitors another Control + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - + + Inability to Process Payments + Stub + + 2024-10-21 accepted - + - - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal - 2022-08-17 + + + + + Statistical Bias + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + ISO 20501:2019 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - + - + - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + + + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + - - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + + + + Data Breach + Concept representing Data Breach + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit + + - + - - - - - Age Discrimination - Discrimination based on a person's age, often impacting older or younger individuals - - 2024-09-30 + Availability Incident + Incident where the availability of information or system has been affected + + + 2024-05-19 accepted - + - + - - Psychological Harm - Something that acts as or causes Psychological Harm - - + Violating Code of Conduct + Concept representing Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - - Operational Security Risk - Risks and issues that arise during operational processes - + + + Inability to Enter Into Contract + Stub + + 2024-10-21 accepted - + + + + Threat Source + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + accepted + + + + - - - Coercion - Something that acts as or causes Coercion - - + Copyright Violation + Concept representing Copyright Violation + + + 2022-08-17 2024-08-16 accepted @@ -5078,150 +5163,119 @@ - - - - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - - 2024-05-19 - accepted - - + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + - - + - Informativeness Bias - Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group - - ISO/IEC 24027:2021 - 2024-09-13 + + Service Provision Delayed + Stub + + 2024-10-21 accepted - Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit - - - - Incident Handling Report - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - - 2024-05-19 - accepted - - - - + - Incident Notice - Notice associated with an Incident - - + + Reduce Severity + Control that reduces the severity of an event + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - + Threat + Risk source event which causes Risk + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Lose of Reputation - Something that acts as or causes Loss of Reputation - - - 2022-08-17 - 2024-08-16 + Floods + The occurence or potential occurence of floods + + 2024-10-21 accepted - Harshvardhan J. Pandit - + - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - 0.61,xsd:decimal + High Risk (RM3x3 S:3 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.67,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 - accepted - - - - + - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.48,xsd:decimal + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + @@ -5229,84 +5283,42 @@ - - - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - - accepted + Intercept Communications + Concept representing Interception of Communications + + This concept was called "InterceptionCommunications" in DPV 2.0 + + 2022-08-17 + 2024-08-16 + modified + Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - - 2022-08-17 - 2024-08-16 + Privacy + accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Very Low Risk - Level where Risk is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - 2022-08-17 - 2024-08-16 + + + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit @@ -5320,9 +5332,9 @@ Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion + Concept representing Unwanted Code Deletion - + 2022-08-17 2024-08-16 accepted @@ -5330,21 +5342,42 @@ - + + + + Risk Control + Control that modifies risk + + + 2024-05-19 + accepted + + + + + + + + + + + Risk Concepts - JSON-LD serialiation + + - Very High Risk (RM7x7 S:4 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - - 0.57,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + @@ -5352,177 +5385,128 @@ - - accepted - - - - - - - - - - Detriment - Something that acts as or causes Detriment - - 2022-03-23 + Equipment Failure + Concept representing Equipment Failure + + Here equipment refers to physical equipment + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Harshvardhan J. Pandit - + - - - - Copyright Violation - Something that acts as or causes Copyright Violation - - + + High Risk (RM7x7 S:4 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.41,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Change Impact - Control that changes Impact - - 2024-05-19 + + + + + Nationality Discrimination + Discrimination based on a person's nationality or citizenship + + 2024-09-30 accepted - Harshvardhan J. Pandit - + - + - Threat - Risk source event which causes Risk - - + Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + + 2024-02-14 + 2024-08-16 accepted - - - - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - - 2024-02-14 - accepted - - - - + - - - - - - - Spoofing - Something that acts as or causes Spoofing - - + + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - - + - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - - 2024-02-14 + + Incident Handling Report + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + + + 2024-05-19 accepted - + - + - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.08,xsd:decimal + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely Low Risk - Level where Risk is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.99,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - + - Direct Discrimination - Occurs when a person is treated less favorably than another in a comparable situation based on a protected characteristic (e.g., race, sex, disability) - - 2024-09-30 - accepted - - - - - - - - - - User Risks - Concepts associated with risks that arise due to User or Human use - + Terrorism + Concept representing Terrorism + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit @@ -5543,47 +5527,49 @@ - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + + + Inability to Provide Health Care + Stub + + 2024-10-21 + accepted + + + + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - 0.08,xsd:decimal + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - High Likelihood - Level where Likelihood is High - - - + + High Severity + Level where Severity is High + + + 0.75,xsd:decimal The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 2022-08-18 @@ -5592,64 +5578,94 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + + - - Physical Harm - + + Compromise Account Credentials + Concept representing Account Credentials to be compromised + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) + + + 2024-02-14 + accepted + + - + - Risk Control - Control that modifies risk - - + + Extremely Low Severity + Level where Severity is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + + + Identification Control + Control to identify characteristics of event + 2024-05-19 accepted - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Extremely High Risk - Level where Risk is Extremely High - + + Extremely High Severity + Level where Severity is Extremely High + 0.99,xsd:decimal The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 @@ -5658,32 +5674,60 @@ - + - - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + + + + + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + + + + + + + + + Re-identification + Concept representing Re-identification + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Monitor Control - Control that monitors another Control - - 2024-05-19 + + + + + + Unauthorised Data Disclosure + Concept representing Unauthorised Data Disclosure + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + @@ -5696,72 +5740,660 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Reduction Control + Control that reduces the likelihood or severity of an event + + 2024-05-19 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Disproportionate Energy Consumption + The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised + + 2024-10-21 + accepted + + + + + + + + + + + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty, Delaram Golpayegani, Harshvardhan J. Pandit + + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - - Risk Concepts - JSON-LD serialiation + + + + + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + + 0.10,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + + 2024-05-19 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + High Risk + Level where Risk is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Service Limited + Stub + + 2024-10-21 + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + Societal Health & Safety + + accepted + + + + + + + + + + + Physical Harm + + accepted + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Moderate Likelihood + Level where Likelihood is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Avoid Source + Control that avoids the risk source + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + Guides for Data Privacy Vocabulary + + + + + + + + Extremely High Risk + Level where Risk is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + + + + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 + 2024-08-16 + accepted + Georg P. Krog, Harshvardhan J. Pandit + + + + + + + + Impact Control + Risk Mitigation Measure that controls Impacts + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" + + 2024-02-14 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 + accepted + + + + + + + + + + + Rights Eroded + The gradual weakening or reduction of the scope and protection of rights + + Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right + accepted + + + + + + + + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Service Denied + Stub + + 2024-10-21 + accepted + + + + + + + + + + + SexualOrientation Discrimination + Discrimination based on a person's sexual orientation, typically against those who are not heterosexual + + 2024-09-30 + accepted + + + + + + + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 + accepted + + + + + + + + + + + Legally Relevant Consequence + A consequence that is legally relevant i.e. actionable under law + + accepted + + + + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Primer for Data Privacy Vocabulary + + + + + + + + + + + Sex Discrimination + Discrimination based on a person's biological sex + + 2024-09-30 + accepted + + + + + + + + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + + + + Geographic Discrimination + Discrimination based on a person's geographical origin or residence + + 2024-09-30 + accepted + + + + + + + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + + + 2024-05-19 + accepted + + + + + + + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + + 2024-05-19 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + Examples for Data Privacy Vocabulary + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + + 2024-02-14 + accepted + + + + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + 0.43,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 + accepted + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - - 2022-08-18 + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + + + + + + Legal Compliance Risk + Risks and consequences regarding legal compliance and its violation + + accepted + + - + - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring 2024-02-14 accepted @@ -5769,227 +6401,160 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - - 2024-05-19 + + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.41,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - - - - - Risk Concepts - HTML serialiation - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + 0.40,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - - 2024-05-19 + + Moderate Risk (RM3x3 S:3 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.33,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.04,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - - Remedy Control - Control to remedy consequences of event - - 2024-05-19 + + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Examples for Data Privacy Vocabulary - - - - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Confidentiality Incident - Incident where the confidentiality of information or system has been affected - - - 2024-05-19 - accepted - - - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - - - Harassment - - accepted - - - - - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Guides for Data Privacy Vocabulary - - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ @@ -5997,25 +6562,22 @@ - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - + - IEC 31010:2019 - https://www.iso.org/standard/72140.html + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - diff --git a/2.1-dev/risk/risk.ttl b/2.1-dev/risk/risk.ttl index 21d4791d7..89cd8bae1 100644 --- a/2.1-dev/risk/risk.ttl +++ b/2.1-dev/risk/risk.ttl @@ -144,7 +144,7 @@ risk:AccidentalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Accidental Misuse"@en ; + skos:definition "Concept representing accidental misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Accidental Misuse"@en . @@ -178,7 +178,7 @@ risk:AuthorisationFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Authorisation Failure"@en ; + skos:definition "Concept representing Authorisation Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Authorisation Failure"@en . @@ -242,9 +242,10 @@ risk:Benefit a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Compensation ; - skos:definition "Something that acts as or causes benefits"@en ; + skos:definition "Concept representing benefits - both material and immaterial"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Benefit"@en . + skos:prefLabel "Benefit"@en ; + skos:scopeNote "Even though benefits is filed under organisational concepts, it can be applied to individuals (humans) and groups which are societal"@en . risk:Bias a rdfs:Class, skos:Concept, @@ -257,7 +258,7 @@ risk:Bias a rdfs:Class, dct:source "ISO/IEC 24027:2021"@en ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Bias"@en . @@ -278,7 +279,7 @@ risk:Blackmail a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Blackmail"@en ; + skos:definition "Concept representing Blackmail"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Blackmail"@en . @@ -298,7 +299,7 @@ risk:BruteForceAuthorisations a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; + skos:definition "Concept representing Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Brute Force Authorisations"@en . @@ -356,7 +357,7 @@ risk:Coercion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Coercion"@en ; + skos:definition "Concept representing Coercion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Coercion"@en . @@ -402,7 +403,7 @@ risk:ComponentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Failure"@en ; + skos:definition "Concept representing Component Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Failure"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of"@en . @@ -417,7 +418,7 @@ risk:ComponentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Component Malfunction"@en ; + skos:definition "Concept representing Component Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Component Malfunction"@en ; skos:scopeNote "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of"@en . @@ -440,7 +441,7 @@ risk:CompromiseAccount a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes a compromised account that is then used by the compromiser"@en ; + skos:definition "Concept representing a compromised account that is then used by the compromiser"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account"@en . @@ -460,7 +461,7 @@ risk:CompromiseAccountCredentials a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Account Credentials to be compromised"@en ; + skos:definition "Concept representing Account Credentials to be compromised"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Compromise Account Credentials"@en . @@ -480,7 +481,7 @@ risk:ConfidentialityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DataBreach ; - skos:definition "Something that acts as or causes Confidentiality Breach"@en ; + skos:definition "Concept representing Confidentiality Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Confidentiality Breach"@en . @@ -576,8 +577,9 @@ risk:CopyrightViolation a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Copyright Violation"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Copyright Violation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Copyright Violation"@en . @@ -623,10 +625,24 @@ risk:Cryptojacking a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Cryptojacking"@en ; + skos:definition "Concept representing Cryptojacking"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Cryptojacking"@en . +risk:CustomerSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing customer support to be limited"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Customer Support Limited"@en . + risk:Damage a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -638,8 +654,8 @@ risk:Damage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Damage"@en . @@ -695,7 +711,7 @@ risk:DataBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityBreach ; - skos:definition "Something that acts as or causes Data Breach"@en ; + skos:definition "Concept representing Data Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Breach"@en . @@ -715,7 +731,7 @@ risk:DataCorruption a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Corruption of Data"@en ; + skos:definition "Concept representing Corruption of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . @@ -736,6 +752,20 @@ risk:DataProcessingBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Data Processing Bias"@en . +risk:DelayedApplicationProcessing a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing delayed processing of applications"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Delayed Application Processing"@en . + risk:DeliberateIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -762,7 +792,7 @@ risk:DenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Denial of Service Attack (DoS)"@en ; + skos:definition "Concept representing Denial of Service Attack (DoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Denial of Service Attack (DoS)"@en . @@ -781,14 +811,15 @@ risk:Detriment a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, + risk:PotentialImpact, risk:PotentialRisk ; dct:contributor "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" ; dct:created "2022-03-23"^^xsd:date ; dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Detriment"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Detriment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Detriment"@en . @@ -822,24 +853,33 @@ risk:DisabilityDiscrimination a rdfs:Class, risk:Discrimination a rdfs:Class, skos:Concept, - dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk, risk:RiskConcept ; dct:contributor "Georg P. Krog" ; - dct:created "2022-08-19"^^xsd:date, - "2024-09-30"^^xsd:date ; - dct:modified "2024-08-16"^^xsd:date ; + dct:created "2024-09-30"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:RiskConcept, - risk:SocietalRisk ; - skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en, - "Something that acts as or causes Discrimination"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Discrimination is the treatment of a person or particular group of people differently, in a way that is worse than the way people are usually treate"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Discrimination"@en . +risk:DisproportionateEnergyConsumption a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of disproportionate energy consumption when considering the value obtained from undertaking the activity and the amount of energy being utilised"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Disproportionate Energy Consumption"@en . + risk:DistributedDenialServiceAttack a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -855,10 +895,24 @@ risk:DistributedDenialServiceAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:DenialServiceAttack ; - skos:definition "Something that acts as or causes Distributed Denial of Service Attack (DDoS)"@en ; + skos:definition "Concept representing Distributed Denial of Service Attack (DDoS)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Distributed Denial of Service Attack (DDoS)"@en . +risk:Earthquake a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of earthquakes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Earthquake"@en . + risk:EnvironmentalIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -876,9 +930,10 @@ risk:EnvironmentalRisk a rdfs:Class, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that have their origin in environment or can affect the environment at large"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Environmental Risk"@en . @@ -899,7 +954,7 @@ risk:EquipmentFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Failure"@en ; + skos:definition "Concept representing Equipment Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Failure"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . @@ -920,12 +975,12 @@ risk:EquipmentMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Equipment Malfunction"@en ; + skos:definition "Concept representing Equipment Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Equipment Malfunction"@en ; skos:scopeNote "Here equipment refers to physical equipment"@en . -risk:ErroneousSystemUse a rdfs:Class, +risk:ErroneousUse a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -940,9 +995,9 @@ risk:ErroneousSystemUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Erroneous System Use"@en ; + skos:definition "Concept representing erroneous use (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erroneous System Use"@en . + skos:prefLabel "Erroneous Use"@en . risk:EthnicDiscrimination a rdfs:Class, skos:Concept, @@ -986,8 +1041,8 @@ risk:ExposureToHarmfulSpeech a rdfs:Class, schema:url "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Harmful Speech"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Harmful Speech"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Exposure to Harmful Speech"@en ; skos:scopeNote "This concept was called \"HarmfulSpeech\" in DPV 2.0"@en . @@ -998,7 +1053,7 @@ risk:ExternalSecurityThreat a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Concepts associated with security threats that are likely to originate externally"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "External Security Threat"@en . @@ -1019,7 +1074,7 @@ risk:Extorsion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Extorsion"@en ; + skos:definition "Concept representing Extorsion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Extorsion"@en . @@ -1113,9 +1168,10 @@ risk:FinancialImpact a rdfs:Class, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Things that cause or have the potential to impact financial resources"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Impact"@en . @@ -1135,10 +1191,24 @@ risk:FinancialLoss a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:FinancialImpact ; - skos:definition "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; + skos:definition "Concept representing Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Financial Loss"@en . +risk:Floods a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "The occurence or potential occurence of floods"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Floods"@en . + risk:Fraud a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1155,7 +1225,7 @@ risk:Fraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Fraud"@en ; + skos:definition "Concept representing Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Fraud"@en . @@ -1203,6 +1273,19 @@ risk:GroupAttributionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Group Attribution Bias"@en . +risk:GroupRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Risks and issues that affect or have the potential to affect groups in society"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Societal Risk"@en . + risk:HaltSource a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -1239,7 +1322,7 @@ risk:Harm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:IndividualRisk ; - skos:definition "Something that acts as or causes Harm to humans"@en ; + skos:definition "Concept representing Harm to humans"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Harm"@en ; skos:scopeNote "This concept refers to the general abstract notion of harm"@en . @@ -1321,7 +1404,7 @@ risk:HumanErrors a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Human Errors"@en ; + skos:definition "Concept representing activities that are errors caused by humans without intention and which was not caused by following rules or policies or instructions that were not from the person"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Human Errors"@en . @@ -1352,7 +1435,7 @@ risk:IdentityFraud a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Fraud"@en ; + skos:definition "Concept representing Identity Fraud"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Fraud"@en . @@ -1372,10 +1455,24 @@ risk:IdentityTheft a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Identity Theft"@en ; + skos:definition "Concept representing Identity Theft"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Identity Theft"@en . +risk:IdentityVerificationFailure a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Concept representing failure to verify identity"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Identity Verification Failure"@en . + risk:IllegalDataProcessing a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -1389,8 +1486,8 @@ risk:IllegalDataProcessing a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Illegal Processing of Data"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Illegal Processing of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Illegal Data Processing"@en ; skos:scopeNote "This concept was called \"IllegalProcessingData\" in DPV 2.0"@en . @@ -1439,6 +1536,90 @@ risk:InGroupBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "In-Group Bias"@en . +risk:InabilityToEnterIntoContract a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Enter Into Contract"@en . + +risk:InabilityToEstablishLegalClaims a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Establish Legal Claims"@en . + +risk:InabilityToFulfillLegalObligations a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Fulfill Legal Obligations"@en . + +risk:InabilityToProcessPayments a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Process Payments"@en . + +risk:InabilityToProtectVitalInterests a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Protect Vital Interests"@en . + +risk:InabilityToProvideHealthCare a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Inability to Provide Health Care"@en . + risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1739,11 +1920,13 @@ risk:IndividualHealthSafety a rdfs:Class, risk:IndividualRisk a rdfs:Class, skos:Concept, + dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:SocietalRiskConcept ; skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Individual Risk"@en . @@ -1779,7 +1962,7 @@ risk:Injury a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Injury"@en ; + skos:definition "Concept representing Injury"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Injury"@en . @@ -1828,7 +2011,7 @@ risk:IntentionalMisuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Misuse ; - skos:definition "Intentional Misuse"@en ; + skos:definition "Concept represent an intentional misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intentional Misuse"@en . @@ -1848,7 +2031,7 @@ risk:InterceptCommunications a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Interception of Communications"@en ; + skos:definition "Concept representing Interception of Communications"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Intercept Communications"@en ; skos:scopeNote "This concept was called \"InterceptionCommunications\" in DPV 2.0"@en . @@ -1893,17 +2076,60 @@ risk:LanguageDiscrimination a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Language Discrimination"@en . -risk:LegalRisk a rdfs:Class, +risk:LegalComplianceRisk a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding legal compliance and its violation"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Compliance Risk"@en . + +risk:LegalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that have their basis in legal requirements and enforcement"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are legal in nature or relate to a legal system or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Legal Risk"@en . + skos:prefLabel "Legal Risk Concept"@en ; + skos:scopeNote "Legal in this context refers exclusively to the law applied within a jurisdiction and does not include internal policies or rules within an organisation"@en . + +risk:LegalSupportLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legal Support Limited"@en . + +risk:LegallyRelevantConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "A consequence that is legally relevant i.e. actionable under law"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Legally Relevant Consequence"@en . risk:LoseCredibility a rdfs:Class, skos:Concept, @@ -1920,7 +2146,7 @@ risk:LoseCredibility a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Credibility"@en ; + skos:definition "Concept representing Loss of Credibility"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Credibility"@en . @@ -1939,7 +2165,7 @@ risk:LoseCustomerConfidence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Customer Confidence"@en ; + skos:definition "Concept representing Loss of Customer Confidence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Customer Confidence"@en . @@ -1958,7 +2184,7 @@ risk:LoseGoodwill a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Goodwill"@en ; + skos:definition "Concept representing Loss of Goodwill"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Goodwill"@en . @@ -1977,7 +2203,7 @@ risk:LoseNegotiatingCapacity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Negotiating Capacity"@en ; + skos:definition "Concept representing Loss of Negotiating Capacity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Negotiating Capacity"@en . @@ -1996,7 +2222,7 @@ risk:LoseOpportunity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Opportunity"@en ; + skos:definition "Concept representing Loss of Opportunity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Opportunity"@en . @@ -2015,7 +2241,7 @@ risk:LoseReputation a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Reputation"@en ; + skos:definition "Concept representing Loss of Reputation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Reputation"@en . @@ -2034,7 +2260,7 @@ risk:LoseTrust a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ReputationalRisk ; - skos:definition "Something that acts as or causes Loss of Trust"@en ; + skos:definition "Concept representing Loss of Trust"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Lose of Trust"@en . @@ -2086,6 +2312,20 @@ risk:LowSeverity a rdfs:Class, skos:prefLabel "Low Severity"@en ; skos:scopeNote "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1"@en . +risk:LoyaltyProgramExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Loyalty Program Exclusion"@en . + risk:MaliciousActivity a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2116,7 +2356,7 @@ risk:MaliciousCodeAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malicious Code Attack"@en ; + skos:definition "Concept representing Malicious Code Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malicious Code Attack"@en . @@ -2137,7 +2377,7 @@ risk:MalwareAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes Malware Attack"@en ; + skos:definition "Concept representing Malware Attack"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Malware Attack"@en . @@ -2152,8 +2392,8 @@ risk:MaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2198,7 +2438,7 @@ risk:Misuse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UserRisks ; - skos:definition "Something that acts as or causes Misuse"@en ; + skos:definition "Concept representing a misuse (of something)"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Misuse"@en . @@ -2360,8 +2600,8 @@ risk:NonMaterialDamage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Non-Material Damage"@en ; + skos:broader risk:LegallyRelevantConsequence ; + skos:definition "Concept representing Non-Material Damage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . @@ -2405,11 +2645,27 @@ risk:OperationalSecurityRisk a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:TechnicalRiskConcept ; skos:definition "Risks and issues that arise during operational processes"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OrganisationalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are organisational in nature or relate to an organisational process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Organisational Risk Concept"@en ; + skos:scopeNote "Organisational in this context refers to an organisation which is not human but is managed by humans"@en . + risk:OutGroupHomogeneityBias a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -2456,11 +2712,39 @@ risk:PersonalSafetyEndangerment a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Personal Safety Endangerment"@en ; + skos:broader risk:IndividualRisk ; + skos:definition "Concept representing Personal Safety Endangerment"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Personal Safety Endangerment"@en . +risk:PersonalisationDisabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Disabled"@en . + +risk:PersonalisationEnabled a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Personalisation Enabled"@en . + risk:PhishingScam a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -2477,7 +2761,7 @@ risk:PhishingScam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Phishing Scam"@en ; + skos:definition "Concept representing Phishing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Phishing Scam"@en . @@ -2496,7 +2780,7 @@ risk:PhysicalAssault a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Physical Assault"@en ; + skos:definition "Concept representing Physical Assault"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Assault"@en . @@ -2512,6 +2796,18 @@ risk:PhysicalHarm a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Physical Harm"@en . +risk:PolicyRisk a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:LegalRiskConcept ; + skos:definition "Risks and consequences regarding policy and its associated processes"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Policy Risk"@en . + risk:PotentialConsequence a rdfs:Class, skos:Concept ; dct:contributor "Harshvardhan J. Pandit" ; @@ -2591,7 +2887,7 @@ risk:PsychologicalHarm a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Psychological Harm"@en ; + skos:definition "Concept representing Psychological Harm"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Psychological Harm"@en . @@ -2608,11 +2904,25 @@ risk:PublicOrderBreach a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:LegalRisk ; - skos:definition "Something that acts as or causes Public Order Breach"@en ; + skos:broader risk:LegalComplianceRisk ; + skos:definition "Concept representing Public Order Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Public Order Breach"@en . +risk:PublicServicesExclusion a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Public Services Exclusion"@en . + risk:RM3x3S1L1 a rdfs:Class, skos:Concept, risk:RiskAnalysis ; @@ -3779,7 +4089,7 @@ risk:Reidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Re-identification"@en ; + skos:definition "Concept representing Re-identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Re-identification"@en ; skos:scopeNote "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification"@en . @@ -3869,7 +4179,7 @@ risk:ReputationalRisk a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reputational Risk"@en . @@ -3921,7 +4231,7 @@ risk:Reward a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Reward"@en . -risk:RightEroded a rdfs:Class, +risk:RightsDenied a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -3930,26 +4240,12 @@ risk:RightEroded a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; - skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Erosion of Rights"@en ; - skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . - -risk:RightObstructed a rdfs:Class, - skos:Concept, - dpv:RiskConcept, - risk:PotentialConsequence, - risk:PotentialImpact, - risk:PotentialRisk ; - rdfs:isDefinedBy risk: ; - sw:term_status "accepted"@en ; - skos:broader risk:RightsImpact ; - skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Obstruction of Rights"@en ; - skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Denied"@en ; + skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsDenial a rdfs:Class, +risk:RightsEroded a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -3958,12 +4254,12 @@ risk:RightsDenial a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:RightsImpact ; - skos:definition "The refusal or withholding or denial of the existence or applicability of rights"@en ; + skos:definition "The gradual weakening or reduction of the scope and protection of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Denial of Rights"@en ; - skos:scopeNote "The denial of the right refers to the argument that a right does not apply at all for a particular case. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + skos:prefLabel "Rights Eroded"@en ; + skos:scopeNote "Erosion of rights typically only applies to passive rights which always apply, since for active rights the exercise of that right is what enables it. An active right can be eroded over time it is limited consistently and increasingly such that the scope of the right is reduced over time. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsExercisePrevention a rdfs:Class, +risk:RightsExercisePrevented a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -3977,7 +4273,7 @@ risk:RightsExercisePrevention a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Actions or measures that prevent an individual or group from exercising their legal rights."@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Prevent Exercising of Rights"@en ; + skos:prefLabel "Rights Exercise Prevented"@en ; skos:scopeNote "This concept was called \"PreventExercisingOfRights\" in DPV 2.0. Violation of a right is a bar for actionable actions by an authority. Other impacts on right may be found to construe a violation of the right, but that is not necessarily always the case i.e. not all impacts are violations of a right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RightsImpact a rdfs:Class, @@ -3994,13 +4290,13 @@ risk:RightsImpact a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Impact to Rights"@en ; + skos:broader risk:SocietalRiskConcept ; + skos:definition "Concept representing Impact to Rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Impact to Rights"@en ; + skos:prefLabel "Rights Impact"@en ; skos:scopeNote "This concept was called \"ImpactToRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsLimitation a rdfs:Class, +risk:RightsLimited a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -4014,9 +4310,23 @@ risk:RightsLimitation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "A limitation or restrictions on the scope or exercise of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Limitation of Rights"@en ; + skos:prefLabel "Rights Limited"@en ; skos:scopeNote "This concept was called \"LimitationOfRights\" in DPV 2.0. The limitation refers to the applicability and scope of the right, and not in the ability to exercise that right. Limitation is therefore fulfilment of the right and its obligations - but for a scope other than what was intended or expected. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . +risk:RightsObstructed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RightsImpact ; + skos:definition "Interference with or blocking of the exercise of rights"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Rights Obstructed"@en ; + skos:scopeNote "In obstruction, the right is not denied, limited, or unfulfilled - but the requirements to enable exercise of the rights are increased to the point of discouraging or obstructing the exercise of that right. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . + risk:RightsUnfulfilled a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -4028,10 +4338,10 @@ risk:RightsUnfulfilled a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "Failure to meet or complete the fulfilment of rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Unfulfilment of Rights"@en ; + skos:prefLabel "Rights Unfulfilled"@en ; skos:scopeNote "Here unfulfilment refers to non-completion of the right's obligations and processes. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . -risk:RightsViolation a rdfs:Class, +risk:RightsViolated a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, @@ -4045,7 +4355,7 @@ risk:RightsViolation a rdfs:Class, skos:broader risk:RightsImpact ; skos:definition "The infringement or breach of rights in a manner that constitues a 'violation' of those rights"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Rights"@en ; + skos:prefLabel "Rights Violated"@en ; skos:scopeNote "This concept was called \"ViolationOfRights\" in DPV 2.0. Though specified as a plural i.e. 'rights', this concept can be applied to a singular right"@en . risk:RiskAnalysis a rdfs:Class, @@ -4195,7 +4505,7 @@ risk:Sabotage a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Sabotage"@en ; + skos:definition "Concept representing Sabotage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sabotage"@en . @@ -4231,7 +4541,7 @@ risk:Scam a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Scam"@en ; + skos:definition "Concept representing Scam"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Scam"@en . @@ -4246,7 +4556,7 @@ risk:SecurityAttack a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes an attack on security with the aim of undermining it"@en ; + skos:definition "Concept representing an attack on security with the aim of undermining it"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Attack"@en . @@ -4268,7 +4578,7 @@ risk:SecurityBreach a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes Security Breach"@en ; + skos:definition "Concept representing Security Breach"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Security Breach"@en . @@ -4288,6 +4598,173 @@ risk:SelectionBias a rdfs:Class, skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Selection Bias"@en . +risk:ServiceAlternativeOffered a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Alternative Offered"@en . + +risk:ServiceCostIncreased a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Cost Increased"@en . + +risk:ServiceDenied a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Denied"@en . + +risk:ServiceLimited a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Limited"@en . + +risk:ServiceNotProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Not Provided"@en . + +risk:ServicePartiallyProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Partially Provided"@en . + +risk:ServiceProvided a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provided"@en . + +risk:ServiceProvisionDelayed a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Provision Delayed"@en . + +risk:ServiceQualityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Quality Reduced"@en . + +risk:ServiceRelatedConsequence a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:OrganisationalRiskConcept ; + skos:definition "A consequence related to the provision of a service"@en ; + skos:inScheme risk:risk-taxonomy-classes . + +risk:ServiceSecurityReduced a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Security Reduced"@en . + +risk:ServiceTermination a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:ServiceRelatedConsequence ; + skos:definition "Stub"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Service Termination"@en . + risk:SexDiscrimination a rdfs:Class, skos:Concept, risk:PotentialConsequence, @@ -4357,7 +4834,7 @@ risk:SexualViolence a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Sexual Violence"@en ; + skos:definition "Concept representing Sexual Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Sexual Violence"@en . @@ -4400,8 +4877,8 @@ risk:SocialDisadvantage a rdfs:Class, dct:modified "2024-08-16"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Social Disadvantage"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Social Disadvantage"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Social Disadvantage"@en . @@ -4429,22 +4906,25 @@ risk:SocietalHealthSafety a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; + skos:broader risk:GroupRisk ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Societal Health & Safety"@en . -risk:SocietalRisk a rdfs:Class, +risk:SocietalRiskConcept a rdfs:Class, skos:Concept, dpv:RiskConcept, risk:PotentialConsequence, risk:PotentialImpact, - risk:PotentialRisk ; + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader dpv:RiskConcept ; - skos:definition "Risks and issues that affect or have the potential to affect society at large or specific groups in society"@en ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are societal in nature or relate to a social setting or process"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Societal Risk"@en . + skos:prefLabel "Societal Risk Concept"@en ; + skos:scopeNote "Societal in this context includes both individuals and groups in a social context, as well as wider implications for society - such as environmental impacts or economic consequences of inflation that can affect both human and non-human entities as part of the social structure"@en . risk:SourceControl a rdfs:Class, skos:Concept, @@ -4475,7 +4955,7 @@ risk:Spoofing a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:MaliciousActivity ; - skos:definition "Something that acts as or causes Spoofing"@en ; + skos:definition "Concept representing Spoofing"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Spoofing"@en . @@ -4511,7 +4991,7 @@ risk:SystemFailure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Failure"@en ; + skos:definition "Concept representing System Failure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Failure"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . @@ -4533,7 +5013,7 @@ risk:SystemIntrusion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:SecurityAttack ; - skos:definition "Something that acts as or causes System Intrusion"@en ; + skos:definition "Concept representing System Intrusion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Intrusion"@en . @@ -4553,11 +5033,27 @@ risk:SystemMalfunction a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:OperationalSecurityRisk ; - skos:definition "Something that acts as or causes System Malfunction"@en ; + skos:definition "Concept representing System Malfunction"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "System Malfunction"@en ; skos:scopeNote "Here system refers to both hardware and software systems"@en . +risk:TechnicalRiskConcept a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialImpact, + risk:PotentialRisk, + risk:PotentialRiskSource ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader dpv:RiskConcept ; + skos:definition "Risk concepts, including any potential risk sources, consequences, or impacts, that are technical in nature or relate to a technological system or process"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Technical Risk Concept"@en ; + skos:scopeNote "Technical in this context refers to concepts associated with technologies or systems as distinct from organisations or humans or legal processes"@en . + risk:Terrorism a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -4572,8 +5068,8 @@ risk:Terrorism a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:SocietalRisk ; - skos:definition "Something that acts as or causes Terrorism"@en ; + skos:broader risk:GroupRisk ; + skos:definition "Concept representing Terrorism"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Terrorism"@en . @@ -4630,7 +5126,7 @@ risk:UnauthorisedAccesstoPremises a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Access to Premises"@en ; + skos:definition "Concept representing Unauthorised Access to Premises"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Access to Premises"@en . @@ -4646,7 +5142,7 @@ risk:UnauthorisedActivity a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:ExternalSecurityThreat ; - skos:definition "Something that acts as or causes Unauthorised Activity"@en ; + skos:definition "Concept representing Unauthorised Activity"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Activity"@en . @@ -4667,7 +5163,7 @@ risk:UnauthorisedCodeAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Access"@en ; + skos:definition "Concept representing Unauthorised Code Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Access"@en . @@ -4687,7 +5183,7 @@ risk:UnauthorisedCodeDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Disclosure"@en ; + skos:definition "Concept representing Unauthorised Code Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Disclosure"@en . @@ -4707,7 +5203,7 @@ risk:UnauthorisedCodeModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Code Modification"@en ; + skos:definition "Concept representing Unauthorised Code Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Code Modification"@en . @@ -4727,7 +5223,7 @@ risk:UnauthorisedDataAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Access"@en ; + skos:definition "Concept representing Unauthorised Data Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Access"@en . @@ -4747,7 +5243,7 @@ risk:UnauthorisedDataDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Disclosure"@en ; + skos:definition "Concept representing Unauthorised Data Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Disclosure"@en . @@ -4767,7 +5263,7 @@ risk:UnauthorisedDataModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Data Modification"@en ; + skos:definition "Concept representing Unauthorised Data Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Data Modification"@en . @@ -4787,7 +5283,7 @@ risk:UnauthorisedInformationDisclosure a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Information Disclosure"@en ; + skos:definition "Concept representing Unauthorised Information Disclosure"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Information Disclosure"@en . @@ -4804,7 +5300,7 @@ risk:UnauthorisedReidentification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Re-Identification"@en ; + skos:definition "Concept representing Unauthorised Re-Identification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Re-Identification"@en . @@ -4824,7 +5320,7 @@ risk:UnauthorisedResourceUse a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised Resource Use"@en ; + skos:definition "Concept representing Unauthorised Resource Use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised Resource Use"@en . @@ -4845,7 +5341,7 @@ risk:UnauthorisedSystemAccess a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Access"@en ; + skos:definition "Concept representing Unauthorised System Access"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Access"@en . @@ -4865,7 +5361,7 @@ risk:UnauthorisedSystemModification a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unauthorised System Modification"@en ; + skos:definition "Concept representing Unauthorised System Modification"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unauthorised System Modification"@en . @@ -4886,7 +5382,7 @@ risk:UnwantedCodeDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Code Deletion"@en ; + skos:definition "Concept representing Unwanted Code Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Code Deletion"@en . @@ -4907,7 +5403,7 @@ risk:UnwantedDataDeletion a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Data Deletion"@en ; + skos:definition "Concept representing Unwanted Data Deletion"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Data Deletion"@en . @@ -4927,7 +5423,7 @@ risk:UnwantedDisclosureData a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:UnauthorisedActivity ; - skos:definition "Something that acts as or causes Unwanted Disclosure of Data"@en ; + skos:definition "Concept representing Unwanted Disclosure of Data"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Unwanted Disclosure of Data"@en . @@ -4938,7 +5434,7 @@ risk:UserRisks a rdfs:Class, risk:PotentialRiskSource ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader dpv:RiskConcept ; + skos:broader risk:OrganisationalRiskConcept ; skos:definition "Concepts associated with risks that arise due to User or Human use"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "User Risks"@en . @@ -5046,8 +5542,8 @@ risk:ViolatingCodeOfConduct a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Code of Conduct"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Code of Conduct"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Code of Conduct"@en ; skos:scopeNote "This concept was called \"ViolationCodeConduct\" in DPV 2.0"@en . @@ -5065,10 +5561,11 @@ risk:ViolatingContractualObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Contractual Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Contractual Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Contractual Obligation"@en ; + skos:prefLabel "Violating Contractual Obligation"@en ; skos:scopeNote "This concept was called \"ViolationContractualObligations\" in DPV 2.0"@en . risk:ViolatingEthicsCode a rdfs:Class, @@ -5084,8 +5581,8 @@ risk:ViolatingEthicsCode a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Ethics Code"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing Violation of Ethics Code"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Ethics Code"@en ; skos:scopeNote "This concept was called \"ViolationEthicalCode\" in DPV 2.0"@en . @@ -5103,12 +5600,26 @@ risk:ViolatingLegalObligation a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Legal Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Legal Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Legal Obligations"@en ; + skos:prefLabel "Violating Legal Obligation"@en ; skos:scopeNote "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0"@en . +risk:ViolatingObligation a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates an obligation - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Obligation"@en . + risk:ViolatingPolicy a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -5116,11 +5627,24 @@ risk:ViolatingPolicy a rdfs:Class, risk:PotentialRisk ; rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes violation of policy which can be either internal or external policy"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Concept representing violation of policy which can be either internal or external policy"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violating Policy"@en . +risk:ViolatingProhibition a rdfs:Class, + skos:Concept, + dpv:RiskConcept, + risk:PotentialConsequence, + risk:PotentialRisk ; + dct:created "2024-10-21"^^xsd:date ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:PolicyRisk ; + skos:definition "Something that acts as a or violates a prohibition - e.g. in a law, code of conduct, policy, contract"@en ; + skos:inScheme risk:risk-taxonomy-classes ; + skos:prefLabel "Violating Prohibition"@en . + risk:ViolatingStatutoryObligations a rdfs:Class, skos:Concept, dpv:RiskConcept, @@ -5134,10 +5658,11 @@ risk:ViolatingStatutoryObligations a rdfs:Class, schema:url "https://www.iso.org/standard/75281.html" ] ; rdfs:isDefinedBy risk: ; sw:term_status "modified"@en ; - skos:broader risk:ViolatingObligation ; - skos:definition "Something that acts as or causes Violation of Statutory Obligations"@en ; + skos:broader risk:LegalComplianceRisk, + risk:ViolatingObligation ; + skos:definition "Concept representing Violation of Statutory Obligations"@en ; skos:inScheme risk:risk-taxonomy-classes ; - skos:prefLabel "Violation of Statutory Obligations"@en ; + skos:prefLabel "Violating Statutory Obligations"@en ; skos:scopeNote "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0"@en . risk:ViolenceAgainstChildren a rdfs:Class, @@ -5155,7 +5680,7 @@ risk:ViolenceAgainstChildren a rdfs:Class, rdfs:isDefinedBy risk: ; sw:term_status "accepted"@en ; skos:broader risk:Harm ; - skos:definition "Something that acts as or causes Child Violence"@en ; + skos:definition "Concept representing Child Violence"@en ; skos:inScheme risk:risk-taxonomy-classes ; skos:prefLabel "Violence against children"@en ; skos:scopeNote "This concept was called \"ChildViolence\" in DPV 2.0"@en . diff --git a/2.1-dev/search.html b/2.1-dev/search.html index 7fb7afc56..66eb5e7d4 100644 --- a/2.1-dev/search.html +++ b/2.1-dev/search.html @@ -107,7 +107,7 @@

    DPV Search Index

    -

    Search through 7043 classes and 205 properties from DPV specifications version 2.1-dev.
    +

    Search through 7080 classes and 205 properties from DPV specifications version 2.1-dev.
    Purl for this page: https://w3id.org/dpv/2.1-dev/search

    @@ -126,7 +126,7 @@

    DPV Search Index